cloud

Tips for Achieving Secure Cloud Access

As more IT organizations adopt cloud environments, secure cloud access should be a top consideration Businesses are moving to a cloud environment in huge numbers. A McAfee survey found that 97% of ...
Security Boulevard
Best of both worlds: automated cloud access management and incident response

Best of both worlds: automated cloud access management and incident response

Cloud adoption has done a lot of good for businesses in driving innovation, agility, and scale. But as organizations adopt cloud services into their IT infrastructure, their security teams are facing a ...
5 mistakes CISOs must avoid in 2019

5 mistakes CISOs must avoid in 2019

It’s that time of year again when you’re expected to review the past year and refine your resource protection strategies to avoid a data breach. The stakes are high. There is almost ...
Zero Trust is the InfoSec trend of 2018: Here’s Why

Zero Trust is the InfoSec trend of 2018: Here’s Why

The use of cloud applications and cloud-based storage have become so popular that organizations are being compelled to re-define and update their security and access strategy to protect their globally distributed digital ...
Zero Day protection of SSH Servers with Zero Trust Access

Zero Day protection of SSH Servers with Zero Trust Access

On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh. Background The vulnerability originated from a specific implementation of an authentication state ...