next gen security
Macro Segmentation vs. Micro Segmentation
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, network segmentation, next gen security, security, Security Research, zero trust
Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to ...
Top Ten NSA and CISA Cloud Security Strategies
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, Kubernetes Security, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
NSA and CISA release a joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
EPA and White House Send Water Industry Cybersecurity Warning
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Security Research
The Biden administration issues a cybersecurity call to action for the US water industry amid flood of cyber threats targeting essential systems This directive (see the official guidance) comes in the wake ...
Implementing Scrum for Cybersecurity Teams
Nik Hewitt | | advice, Best Practices, Cybersecurity, next gen security, security, Security Research, TrueFort
How can cybersecurity teams adopt Scrum for agile and responsive best practices? Staying ahead of cybersecurity threats requires cutting-edge technology and agile and effective management practices. Enter Scrum, a framework initially designed ...
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...
How Can CIOs Prepare Their Organizations for Generative AI?
Nik Hewitt | | advice, AI, Best Practices, Cybersecurity, next gen security, security, Security Research, Supply Chain Attacks
Generative AI: A new challenge in preparing organizations and setting policies In our swiftly evolving and ‘somewhat spicey’ digital age, Chief Information Officers (CIOs) now find themselves at the helm of navigating ...
The Importance of Compliance Hardening
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...
CVE-2024-21412 Vulnerability Reported in Defender SmartScreen
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, vulnerability, zero trust
Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Nik Hewitt | | Best Practices, lateral movement, next gen security, Phishing, security, Security Research, Security Training, zero trust
Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
What is Micro Breaching?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Security Research, visibility, zero trust
What is micro breaching, and how can organizations defend themselves? Not all attacks make headlines with massive data leaks or crippling ransomware attack impacts. Enter the realm of “micro breaching,” a subtle ...