automation AI/ML access automation XSS Magecart zero trust

Human-Centric No-Code Automation is the Future of Cybersecurity

It’s never been more challenging to work in cybersecurity. The cost of a breach keeps going up, the number of attacks is constantly increasing and the industry is in the middle of a multi-year staffing crisis. It’s no surprise that 90% of security teams see automation as essential for them ... Read More
Security Boulevard

5 mistakes CISOs must avoid in 2019

It’s that time of year again when you’re expected to review the past year and refine your resource protection strategies to avoid a data breach. The stakes are high. There is almost nothing more frightening than having to deal with the fallout of a cyber attack ... Read More

Why Automation And APIs Should Replace User Interfaces For Enterprise IT And Security Solutions

This blog was originally published on Forbes The information technology market, according to various opinions, is evolving in cycles or waves. Each such cycle can have clear specifications on how an IT solution works, how its users interact with it, etc. Sometimes the market will see certain features, such as ... Read More

Zero Trust is the InfoSec trend of 2018: Here’s Why

The use of cloud applications and cloud-based storage have become so popular that organizations are being compelled to re-define and update their security and access strategy to protect their globally distributed digital assets from cyber attacks. The financial impact of a data breach can run into the billions, and irreversible ... Read More

To Trust Or Not To Trust: That Is The Question

Information security is a field that has received a lot of attention in recent years from theoreticians and practitioners alike. Coming from an IT network security practitioner background over the last 15 years, I am always on the hunt for new ideas, particularly when it comes to innovating in the ... Read More
Zero Trust access to multiple datacenters. Download the DevOps Case Study now!

Zero Day protection of SSH Servers with Zero Trust Access

On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh. Background The vulnerability originated from a specific implementation of an authentication state machine, that is shared between the client and the server, and allows maliciously-implemented clients to bypass the required ... Read More