Managing Your Security Product in the Cloud, Like a Spartan

Managing Your Security Product in the Cloud, Like a Spartan

The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though ...

Extending Zero Trust to the Endpoint

| | cyber security strategies
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred ...

Extending Zero Trust to the Endpoint

| | cyber security strategies
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred ...

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...

Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...

Improving Your Vulnerability Remediation Process

As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...

Improving Your Vulnerability Remediation Process

As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...

Building a Cyber Security Strategy & Plan As a New CISO

As a CISO, your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding. It’s not uncommon for an organization to ...

Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?

Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships. But we’re not talking psychology today. We’re talking cybersecurity. And when ...

Credential Stuffing Attack Prevention and Mitigation

You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of ...