1-2

Why IaaS Security Should be a Priority

Why are CIOs and IT organizations prioritizing investment in cloud infrastructure? The answer is simple: to better support virtual workforces, supply chains, and partners. Getting the most value out of legacy systems ...
historic-columbia-river-highway-hairpin-curve-on-the-rowena-loops-4a28c8-1600

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices ...
Holger picture

Now is the Time To Rethink Your BYOD Security Strategy: Q&A with Cybersecurity Insiders Founder, Holger Schulze

As more companies embrace the Bring Your Own Device (BYOD) movement to accommodate a rapidly evolving workforce, one question comes to mind: How are IT and security leaders handling this sudden wave ...
The Future of Work is Hybrid  – Is Your Security Ready

The Future of Work is Hybrid – Is Your Security Ready?

It wasn’t that long ago that most of us used to work in an office. Fifteen months into the global COVID pandemic it’s now certain that the future will not be a ...
6.22.21 Blog - Blank

Ignorance is Bliss… for Hackers

Imagine standing in front of the CEO and company board of directors, asking them for a check for an obscene amount of money to pay off hackers that are holding critical data ...
colonial

What We Can Learn from the Colonial Pipeline Breach

On June 8, 2021, Joseph Blount, President and Chief Executive Officer of Colonial Pipeline, appeared before the United States Senate Committee on Homeland Security and Governmental Affairs regarding the breach that injected ...
6.9.21 Blog - Social

Will New Executive Order on Cybersecurity Fast Track Zero Trust?

On May 12, US President Biden issued a landmark executive order on Improving the Nation’s Cybersecurity that signals the need for governments and enterprises alike to boost their cyber defenses around the ...
Pretty young lady taking a decision with scale above her head

Six Key Characteristics of a Modern ZTNA Solutions

Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while ...
SaaS and BYOD Malware or ATP

Malware in the Cloud: Odds Are You’re Infected

Malware attacks increased by 358% in 2020, while ransomware attacks, in particular, increased by 435%. Additionally, malware is targeting cloud apps more than ever before, and, at any given moment, 44% of ...
close up of a puzzle game parts-1

Better Together: The Future of CASBs and SWGs

We’ve established before that cloud access security brokers (CASBs) and secure web gateways (SWGs) do not compete and are, in fact, complementary security tools. However, in addition to this, there is overlap ...