cyber security strategies
Managing Your Security Product in the Cloud, Like a Spartan
The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though ...
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred ...
Extending Zero Trust to the Endpoint
What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010. Initially, Zero trust referred ...
Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...
Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software ...
Improving Your Vulnerability Remediation Process
As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...
Improving Your Vulnerability Remediation Process
As security teams know all too well, data breaches are a fact of life. They’re also a huge thorn in the side of many companies. With the average data security breach costing ...
Building a Cyber Security Strategy & Plan As a New CISO
As a CISO, your cyber security strategy plan drives data protection for the organization across every aspect of business processes including new hires and onboarding. It’s not uncommon for an organization to ...
Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?
Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships. But we’re not talking psychology today. We’re talking cybersecurity. And when ...
Credential Stuffing Attack Prevention and Mitigation
You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of ...

