Lack of Network Segmentation in Cybersecurity

This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. In ...
SDP, VPN,

SDP: The Paradigm Shift in Network Security You Can’t Ignore

| | Cloud, Cybersecurity, network, SDP, VPN
In its heyday, the virtual private network (VPN) commanded immense respect as a groundbreaking leap forward in IT security, establishing an invincible perimeter for protecting confidential data. But that was almost 30 ...
Security Boulevard
Detecting and Responding to a Data Breach

Detecting and Responding to a Data Breach

In this comprehensive blog, we explore the cybercriminal's mindset, the techniques they employ, and the devastating effects of a data breach. More importantly, we provide strategic insights into how to identify and ...
vulnerability ConnectWise

The Essential Guide to Securing Hybrid Workplace Environments

From here on out, hybrid and remote work are here to stay. Unfortunately, this seismic shift in the way we work has expanded the attack surface for opportunistic cybercriminals. Mimecast’s 2022 state ...
Security Boulevard
traffic anomalies microsegmentation NDR network SASE K8s Network Traffic Analysis Security Goals 5g

Discovering Network Traffic Anomalies to Identify Threats

It’s no secret; by nearly any metric available, cybercrime has grown at an alarmingly fast rate in recent years. As a result, organizations are desperate to implement new cybersecurity measures that increase ...
Security Boulevard

IT admin admits sabotaging ex-employer’s network in bid for higher salary

A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems. Casey K Umetsu, of Honolulu, Hawaii, has ...
Get your SOCKS on with gTunnel

Get your SOCKS on with gTunnel

Get Your SOCKS on with gTunneltl;drSteps to setup a wicked fast SOCKS proxy with a tool called gTunnel written by hotnopsForewordFirst and foremost, I would like to take a moment to commemorate my first ...
Anomaly Detection Through Machine Learning

Anomaly Detection Through Machine Learning

The role of a security engineer never stops! Get a technical exploration into how machine learning is changing the game of SecOps at Anitian. The post Anomaly Detection Through Machine Learning appeared ...
Guidelines on Network Infrastructure Security

Guidelines on Network Infrastructure Security

Has anyone noticed that IT is no longer the same as it was a few years ago? Apart from IT equipment, we are now concentrating on network infrastructure and security. The expectation ...