printers

Implementing Zero-Trust? Don’t Forget About Printers

When John Kindervag defined the zero-trust model in 2010, printers were not top-of-mind. As the adoption of this model increases, it is likely that most people are still not taking printing into account as ...
Security Boulevard
supply chain Akamai guardicore atom microsegmentation

Survey Sees Greater Appreciation of Software Supply Chain Risks

A survey of 1,000 organizations in North America, Europe, Asia-Pacific and Japan found potential attacks against software supply chains are now a bigger concern than attacks that exploit zero-day vulnerabilities or ransomware ...
Security Boulevard
deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

BYOD Finally Goes Mainstream

The concept of bring your own device (BYOD) is not new, but with the abrupt shift to remote/hybrid work forced businesses that once balked at the idea to accept it, if not ...
Security Boulevard

How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

Organizations can take various steps to protect their operational technology (OT) environments against digital threats. But some stand out more than others. In particular, network segmentation is described as “the first answer ...
cyberattacks breaches

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege ...
Security Boulevard
DNS SASE network segmentation palo alto networks Defenses of Ad Networks

Automated Network Segmentation is a Security Service Away

Network segmentation is a practice as old as Ethernet. Though it was originally a practice to limit broadcast domains, as the number of connected devices and environments grew, the applicability of segmentation ...
Security Boulevard

How to Protect Your Business from Ransomware

After a series of ransomware attacks hit cities last year, finally some good news: Las Vegas was able to stop a ransomware cyber-attack in its tracks. When the cyber-attack was detected, the ...
certificate Menlo states cyber

How to Position the Enterprise for Zero Trust Success

“Zero Trust” may seem like a buzzword to some, but it’s a hot topic for a good reason. Most companies inevitably will adopt some form of the security strategy at some point, ...
Security Boulevard
Matthew Pascucci

Just Patch Already… It’s Not that Easy

We’ve all heard it before, “Just patch all the things and you’ll be perfectly fine” and there’s a lot of truth to this statement; it’s also extremely shortsighted. If you’re working in ...

Trustworthy Network Segmentation for an Untrustworthy World

Denial is not a strategy. The reality is that networks, PCs and XenApp clients are susceptible to attacks, if they haven’t been breached already. Network segmentation is an imperative. Organizations need to ...