Covid-19 caused organizations to sprint towards a remote workforce at an incredible pace. Now, that sprint has turned into a marathon, as more businesses are leaning towards keeping the majority of their workforce remote for the foreseeable future. The new normal is...
Category:
blog
Your Voter Registration Needs ‘Extra Details’ – The Latest Phishing Lure
Today is election day, and 100 Million people have already voted. In all probability, this year’s total number of voters is on pace to exceed 2016 elections. While the voting is on, there is a real concern over disinformation campaigns that might affect the outcome....
Microsoft October 2020 Patch Tuesday Fixes & How Cognitive Trust Can Help
Last week, Microsoft released its monthly batch of security updates, which has come to be known as Patch Tuesday, and patched 87 vulnerabilities across a wide range of Microsoft products. The fixes address critical RCE (Remote Code Execution) bugs in windows TCP/IP...
How SDP can prevent Ransomware attacks in Healthcare
2020 has been a banner year for ransomware in health care organizations. According to healthitsecurity.com, “Universal health Services, one of the largest US health systems, confirmed on October 3, 2020 that the ransomware attack reported earlier last week has...
Zero Trust Network Access (ZTNA): The Enterprise Shift in Architectural Security
Zero Trust Network Access (ZTNA): The Enterprise Shift in Architectural Security Behind the push for “never trust, always verify” security Traditional perimeter security has failed. Or, at least, the outside-in perimeter has long outlived its usefulness. With the...
Beyond Legacy VPN: 10 Must-Have Features for Replacing Your legacy VPN
In the wake of the global COVID-19 pandemic, a majority of organizations have swiftly transitioned vast portions of their workforces to remote work. With that, security and networking leaders have been faced with a dual challenge: rapidly scaling work-from-home...
Obviating Traditional VPNs
The ever changing threat landscape coupled with current global pandemic is forcing enterprises to rethink their remote access strategy. Enterprises need adaptive security and scalable remote access more than ever before. Traditional remote access VPNs, the norm for...
Introducing a transformational new approach to enterprise security: Zero Trust networking and Software-Defined Perimeter
Today, we’re launching Elisity — and with it, a new paradigm for securing access in enterprises. I am extremely excited to announce Elisity’s exit from stealth mode with a top-tier security and networking team, world-class investors and advisors, and a mission to...
How Identity Became the New Perimeter
How enterprise security has changed — and where it’s headed Not long ago, enterprise security architecture was modeled like a castle, complete with walls and a moat. Enterprises hosted their corporate applications in the data center, and users accessed them from...
5 Stages to Adopt a “Zero Trust” Networking Model
Develop a level-headed strategy Are you a cybersecurity professional interested in Zero Trust, but don’t know where to begin? Perhaps you embarked on a Zero Trust journey with multi-factor authentication (MFA) but got stuck while test driving it in other areas, like...