Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today's enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This ... Read More
Rethinking ZTA defense Strategy GraphicsBlog_9.16.20.png

Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: ... Read More
EdgeBlog_9.14.20.png

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

| | Cloud Security, edge, zero trust, zerotrust
In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start ... Read More
Figure 1.jpg

Working from Home — The New Threat Frontier

The emergence of the COVID-19 outbreak dramatically changed and disrupted the normal routines of our personal and professional lives. It led us to stay inside and work from home. It altered our browsing habits from our corporate devices, and it ... Read More
zero trust

Zero-Trust: Stay Safe While Working Remotely

A zero-trust security model can help organizations and their employees stay secure, no matter where they’re located Up until February of this year, working remotely was typically looked upon as a growing benefit for employees. The opportunity to work from home—or in a location outside of their standard office—was something ... Read More
Security Boulevard
ztaholidayone.jpg

Zero Trust Access: Santa Claus Wasn’t the Only One Working Christmas Eve

| | zero trust
The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea ... Read More
Phishing in the Wild: A New Threat Research Paper

Phishing in the Wild: A New Threat Research Paper

|
Phishing is an extremely common attack vector that has been used for many years, and the potential impact and risks involved are well known to most Internet users. Despite this, phishing is still a highly relevant attack method being used ... Read More