perimeter security
Why Traditional Approaches Don’t Work for API Security
API sprawl, which Brian Otten, VP of the digital transformation catalysts division with Axway, defined as “an uncontrolled proliferation of APIs in an organization,” is creating a flood of new security headaches ...
RIP Perimeter Security: Critical Infrastructure Breaches Demand New Approach
The ongoing spate of breaches against critical infrastructure and government entities underscores the vulnerability of this sector. In July 2022, officials announced the federal court system had experienced a major data breach ...
Closing the Security Gaps at the Edge
More than 18 months into the COVID-19 pandemic and the new normal of the workplace, organizations continue to figure out how to best approach cybersecurity. And they are struggling. A new study ...
5 Devastating Endpoint Attacks: Lessons Learned
Many cybersecurity attacks, including some of the biggest and most recent attacks, target corporate endpoints. Reviewing these five large attacks that leveraged weaknesses in endpoints can teach organizations important lessons and identify ...
I don’t like dogs; I need a dog.
This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs ...
Tips and Best Practices for Network Security in the Connected Enterprise
Despite the best collective efforts of the global IT community, cybercriminals are still making their way into what many believe are secure networks. Experts now predict cybercrime damages will reach $6 trillion ...