microsegmentation
JSOutProx Malware Variant Targeting Financial Orgs., Warns Visa
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, Malware, microsegmentation, next gen security, security, Security Research, vulnerability
Visa issues alert on the rising threat from JSOutProx malware targeting financial institutions Visa has recently issued a critical security alert concerning a significant uptick in the activity of the particularly hazardous ...
The Importance of a Multi-Layer Security Stack
Nik Hewitt | | application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Ransomware, security, Security Research
Multi-layer security is an essential business consideration for the best possible cyber defense When cyber threats are evolving at an unprecedented pace, multi-layer security has become the best practice, and relying on ...
Preparing for DORA Compliance
Nik Hewitt | | advice, Best Practices, Cybersecurity, iot, IT-OT, lateral movement, microsegmentation, next gen security, Platform News, Ransomware, security, Security Research, TrueFort, zero trust
In the quest for DORA compliance, we offer a solution for financial services before the January 2025 deadline DORA compliance is born of the financial sector’s growing dependence on Information and Communications ...
Satellite Cybersecurity is a Pressing Reality
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
Satellite cybersecurity has become a pressing issue, with critical infrastructure resting on telecom success The importance of telecoms and satellite cybersecurity cannot be overstated. In the vast expanse of space, the critical ...
Zero-Day Exploits Surge, Reports Google Threat Analysis Group
Nik Hewitt | | advice, analysis, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero-day
Google TAG reports a concerning rise in zero-day exploits for 2023 and the year to come As we enter Q2 of 2024, and looking back with hindsight, 2023 marked a significant increase ...
The Biggest Misconceptions of Zero-Trust
Nik Hewitt | | advice, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
There are a lot of misconceptions around zero-trust cybersecurity practices, so let’s lay some of them to rest Zero trust is grounded in the principle of “never trust, always verify.” Despite its ...
Macro Segmentation vs. Micro Segmentation
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, network segmentation, next gen security, security, Security Research, zero trust
Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to ...
Top Ten NSA and CISA Cloud Security Strategies
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, Kubernetes Security, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
NSA and CISA release a joint guide outlining ten pivotal cloud security strategies for enterprise In a business world dominated by cloud-based solutions, robust cloud security strategies for cloud environments have never ...
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...
Zero-Trust Network Access: Why so Many Teams Get it Wrong
Charlie Gero | | cybercrime, Cybersecurity, identitty management, identity governance administration, Infosec, microsegmentation, Ransomware, zero trust, ZTNA
Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ...
Security Boulevard