ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Zero-Trust Network Access: Why so Many Teams Get it Wrong

Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ... Read More
Security Boulevard
Trusting Locations Bites Us Yet Again

Trusting Locations Bites Us Yet Again

Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020. Thankfully, this latest attempt was not as impactful as those in the past. It was discovered early on ... Read More
Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks ... Read More
1084 MP-27664 IMG_Blog Post Image_700x400_B.jpg

Akamai + Fingerbank: How an open source community can transform security

Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the inherent value in keeping it as such. In so doing, they didn't just launch a product--they created a ... Read More