What is Your Password?

6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

| | Credential Compromise
Most of us still dream practical, down to earth, old fashioned dreams. And I’d place a bet that not many people, if any, dream about their credentials being stolen. Almost all of my memories from the last 15 years or so are stored digitally. The majority of my day to ... Read More
USENIX Enigma 2018 - LISA: A Practical Zero Trust Architecture

Zero Trust: Why Implementation Doesn’t Have to Mean Painful Surgery On Your Network – Pt. 2

|
Across the conference circuit and the general cybersecurity community this year, Zero Trust – a term originally coined in 2010 – has been perhaps the industry’s hottest buzzword. Move over, blockchain and machine learning. In my previous blog, I outlined what Zero Trust means and what lessons the framework offers ... Read More
John Kindervag of Forrester Research Discusses "Zero-Trust Architecture"

Hostile by definition: Thoughts on Zero Trust Security – and its pitfalls. Part 1

|
It’s a common question after a major breach: did you do everything you could have to protect your network? Most of the time the answer is...probably not. Often, we live in a false sense of security. We know it, and most of us are OK with it. But let's talk ... Read More
Seamless Threat Prevention for Cloud Assets - Preempt Secure Federated Access

Transitioning applications to the cloud doesn’t have to mean sacrificing security, visibility or control

|
A CISO recently told us that despite having an impressive array of cybersecurity solutions during their transition to the cloud, nothing was tying it all together from a threat standpoint. From her perspective, all the security tools at their disposal were great individually, but lacked visibility across all accounts and ... Read More
Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

|
It’s increasingly difficult and more complex to be an effective buyer of security products today. Messaging and content overlaps are everywhere, cloud platforms claim to do what endpoint solutions do, and all the while products are constantly pivoting in the middle of operation - often changing their identity and main ... Read More

How to Use Identity, Behavior and Risk to Prevent Compromised Credentials

Identity, Behavior and Risk. Identity, Behavior and Risk. Almost like a mantra. Think about it for few seconds. Identity, Behavior and Risk are the 3 main pieces of evidence that security personnel would like to deeply understand so they can protect their organization and users from credential compromise ... Read More
Getting the Most out of a Security Product POC

Getting the Most out of a Security Product POC

Vendors, especially in the over crowded security space, often must help buyers justify their investment. But what happens when there isn’t a real problem during the test period? This can make it difficult to properly assess. Some security vendors will simulate problems, others may sponsor penetration tests, or they may ... Read More