
Zero-Trust Network Access: Why so Many Teams Get it Wrong
Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ... Read More

Trusting Locations Bites Us Yet Again
Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020. Thankfully, this latest attempt was not as impactful as those in the past. It was discovered early on ... Read More

Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks
The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks ... Read More

Akamai + Fingerbank: How an open source community can transform security
Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the inherent value in keeping it as such. In so doing, they didn't just launch a product--they created a ... Read More