Security Research
The Dual Solution to Zero-Day Attacks
Mukesh Singh | | advice, Best Practices, Cybersecurity, File Integrity Monitoring, microsegmentation, next gen security, Platform News, security, Security Research, zero-day
Microsegmentation and file integrity monitoring (FIM) for peace of mind against zero-day attacks When I speak to our clients, it’s clear that zero-day attacks represent one of the most challenging threats to ...
What is Malvertising?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, Malware, microsegmentation, next gen security, Ransomware, security, Security Research
What is malvertising, and what can security teams do about it? ‘Malvertising’ has recently become a recurring part of security team conversations and stands out as a particularly insidious challenge. Malvertising, or ...
Leveraging Existing EDR Agents for Cybersecurity ROI
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Platform News, security, Security Research, TrueFort, zero trust
Organizations are increasing cybersecurity ROI by maximizing the use of their existing endpoint detection and response (EDR) agents No one is giving money away, budgets are getting increasingly tighter, and security teams ...
2024 Cybersecurity Forecasts and Recommendations
Sameer Malhotra | | advice, Best Practices, Company News, Cybersecurity, next gen security, security, Security Research, TrueFort
What are the big 2024 cybersecurity factors, and what can we do about them? Our industry is in constant flux, and staying ahead of emerging threats is a continuous and labor-intensive challenge ...
Software Supply Chain Security Resilience
Nik Hewitt | | advice, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, Supply Chain Attacks, TrueFort, zero trust
How can security teams guarantee their software supply chain security is resilient against potential cyber threats? The sophistication and proliferation of cyber threats have become daily news, and securing the software supply ...
The Strategic Shift from Internal Firewalls
Matt Hathaway | | advice, application protection, Best Practices, lateral movement, microsegmentation, next gen security, security, Security Research, TrueFort
The ‘internal firewalls approach’ to network security is being reevaluated After nearly twenty years in the security industry, I am always thrilled when I see a change in its collective mindset—the bulk ...
The Machine Learning Cybersecurity Revolution
Nik Hewitt | | advice, Best Practices, Cybersecurity, machine learning, next gen security, Platform News, security, Security Research, TrueFort, zero trust
Balancing the promise and pitfalls of machine learning cybersecurity The integration of machine learning (ML) has opened up new frontiers for defending against complex and evolving cyber threats. However, machine learning cybersecurity ...
What do Network Security Engineers Want?
Max Dalziel | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, next gen security, security, Security Research, zero trust
What keeps network security engineers up at night, and how can they get a decent night’s sleep? Day to day, I speak to a lot of network security engineers as part of ...
How Can We Achieve Workload Hardening?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, insider threat, lateral movement, microsegmentation, next gen security, security, Security Research, service account protection, Uncategorized, workload hardening, workloads, zero trust
What are the workload hardening best practices, and how can we use them to strengthen cyber defense? Even the most casual observer can see that cyber threats are becoming more sophisticated – ...
Implementing Effective Access Controls
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, TrueFort, Uncategorized, zero trust
Using zero trust architecture for effective access controls in a perimeterless world The traditional security perimeter has dissolved, giving rise to the necessity of a Zero-Trust Architecture (ZTA). This strategic approach to ...