zero trust
How to Segment SSH and RDP for Zero Trust SuccessÂ
RDP and SSH remain top targets for attackers because they offer direct access to the systems that matter most. As covered in our earlier post (Why You Should Segment RDP & SSH), ...

What Kind of Identity Should Your AI Agent Have?
7 min readAI agents don’t neatly fit into your IAM chart. They switch roles, borrow authority, and rewrite what identity means at runtime. Here's what that means for you. The post What ...
The Role of Microsegmentation in Managing Lateral Movement Through Inbound and Outbound Traffic PoliciesÂ
Microsegmentation has become a foundational component of enterprise security and a Zero Trust Architecture (ZTA). As threats continue to grow in complexity, the ability to contain and limit the spread of an attack ...

The Last Mile of Zero Trust: Securing Where Work Really Happens — The Browser
The Last Mile of Zero Trust: Securing Where Work Really Happens — The BrowserAt RSAC this year, Andy Ellis, former CSO at Akamai and now Partner at YL Ventures, challenged us to rethink what Zero ...

IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience
In an industry currently full of noise, new logos and two-letter slides, IBM is proving that real security transformation in the AI revolution takes more than a lofty latte imbued vision. ...

Security Gamechangers: CrowdStrike’s AI-Native SOC & Next Gen SIEM Take Center Stage at RSAC 2025
CrowdStrike introduced several enhancements to its Falcon cybersecurity platform and Falcon Next-Gen SIEM at the RSA Conference 2025, highlighting artificial intelligence, managed threat hunting and operational efficiencies aimed at transforming modern Security ...
Why You Should Segment RDP & SSH
Securing remote access pathways often feels like an endless battle against evolving threats. Attackers continually search for exposed protocols, especially those that provide direct or near-direct access to critical systems. Remote Desktop ...
Importance of a Zero Trust ArchitectureÂ
Zero Trust Architecture (ZTA) is more than a buzzword; it is an essential security framework used to combat escalating cybersecurity threats. Cybersecurity has become a non-negotiable priority in every organization’s infrastructure. Today, ...

WarGames – it’s not 1983 anymore
China’s state-sponsored cyber operations, driven by groups like Volt Typhoon, Salt Typhoon, Brass Typhoon, and APT41, and amplified by techniques like Fast Flux DNS, are not chasing Hollywood apocalypse—they’re seizing America’s networks, ...

HPE Extends Scope of Cybersecurity Reach Across Multiple Platforms
Hewlett Packard Enterprise (HPE) at the 2025 RSA Conference today added a series of controls for users, devices and applications to its cloud-based network management platform that promise to make it simpler ...