ZTNA

Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start

ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing ...
Security Boulevard
electric vehicle

Security Essential as Electric Vehicles Accelerate

The electric vehicle (EV) market continues to expand at a rapid pace and demonstrated strong year-over-year growth before the pandemic emerged. According to a recent survey by IEA, sales of electric cars ...
Security Boulevard
Linux

Why Linux Should Factor Into Your Security Strategy

Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, ...
Security Boulevard
cloud

6 Ways to Reduce Your Cloud Attack Surface

With the growing awareness of the potential security vulnerabilities of SaaS services, your security team needs to quickly address the fact that the more identity-related points of exposure your organization maintains in ...
Security Boulevard
secure enclaves

Secure Enclaves: Data Protection So Secure, No One Knows About It

Secure enclaves may be the technology that no one has heard of—yet The primary objective of cybersecurity is to protect data. While data security solutions have existed almost since the beginning of ...
Security Boulevard
ransomware

Ransomware’s Brutal ‘Second Wave’

Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up ...
Security Boulevard
cloud

Using Cloud Costs to Find Your Crown Jewels

Looking at overall cloud spend can be a common measurement for comparison when determining where your crown jewels data reside The first step to securing your infrastructure is understanding what assets need ...
Security Boulevard
network security

Network Security: Why Visibility Isn’t Enough

In the new Industry 4.0, the number of connected IoT devices is growing by 127 every second and is expected to reach over 75 billion by 2025, many of which will be ...
Security Boulevard
mobile application security

5 Reasons Why Mobile Application Security Fails

Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, ...
Security Boulevard
behavioral biometrics

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard