Creating internal champions with proactive security strategies Rom Hendler April 17, 2023 Understand potential vulnerabilities, recognize how systems can be infiltrated and implement protective measures to maintain a secure environment. Read More
Are federal regulations the watershed moment for zero trust? Jim Barkdoll April 7, 2023 With federal regulations related to zero trust and cybersecurity looming, many believe this will be the catalyst for an increase in deployments.Read More
Lumen falls victim to 2 ransomware attacks Rachelle Blair-Frasier April 3, 2023 In a recent Securities and Exchange Commission filing, Lumen Technologies, Inc. reported it was the victim of two ransomware attacks.Read More
How to cut the line on increasingly phishy hackers this tax season Almog Apirion March 30, 2023 Tax season has begun. Hackers and the IRS are on the hunt for employees’ personal information and cybercriminals will get crafty with attack methods.Read More
Being proactive creates a future-proof security strategy Sam Crowther March 23, 2023 Proactive cybersecurity is essential for protecting any organization from potential threats, helping to protect systems, networks & data from attack.Read More
As data privacy gets stricter, is zero trust the answer? Listen to Mark Ruchie, CISO at Entrust, in this podcast episode. Security Staff March 22, 2023 How should security leaders implement zero trust? Find out more in this Security podcast episode featuring Mark Ruchie, CISO at Entrust.Read More
NSA releases information for advancing zero trust Security Staff March 15, 2023 To help improve threat prevention, the NSA released the Advancing Zero Trust Maturity throughout the User Pillar Cybersecurity Information Sheet. Read More
Now is the time to prioritize cybersecurity Darren Guccione March 15, 2023 Taking a pervasive approach to cybersecurity that achieves visibility, security and control across the entire organization is non-negotiable. Read More
Reducing dwell time of threat actors requires a reactive workforce Julian Zottl February 21, 2023 Organizations need to be properly equipped to respond as quickly as possible to reduce how long an attacker has access to sensitive data. Read More
How attackers are pairing MFA manipulation & social engineering tricks Sinan Eren February 15, 2023 The right combination of training, security policies & zero trust technology can provide protection from any credential-based attack vector. Read More