perimeter

The Network is Key to Securing the Everywhere Perimeter
Ed Koehler | | distributed architecture, Network Security, perimeter, stealth networking, virtual network overlays
In light of surging ransomware cases and recent high-profile cyberattacks like those on SolarWinds, Colonial Pipeline, and meat supplier JBS, enterprise security teams may fall into the trap of thinking, “more defenses ...
Security Boulevard

Remote Work Lessons Learned
To say that the world was unprepared for what happened in March of 2020 would be a gross understatement. Nobody needs a reminder of the seismic changes that the coronavirus pandemic introduced ...
Security Boulevard

Phishing Campaign Used SharePoint to Bypass Email Perimeter Tech
David Bisson | | IT Security and Data Protection, Latest Security News, perimeter, Phishing, sharepoint
Security researchers spotted a phishing campaign that used SharePoint to bypass email gateway and other perimeter technologies. Cofense learned of the campaign after it analyzed an attack email sent from a compromised ...