Cameyo SolarWinds Double Standard of Reporting Breaches

Cameyo Adds Secure Cloud Tunneling Capability

Cameyo, an application virtualization platform provider, today added a tunneling capability that eliminates the need for virtual private networks (VPNs) to open ports in firewalls to enable remote users to access applications ...
Security Boulevard
Citrix SASE zero-trust testing secure enclaves

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise ...
Security Boulevard
vulnerability PixieFail network bug

How SASE Enables Zero-Trust

On this episode of The View With Vizard, Mike Vizard talks with Kelly Ahuja, CEO of Versa Networks about their latest $84 million funding round and the ways SASE enables zero-trust. The ...
Security Boulevard
vulnerability ConnectWise

A New Remote Zero-Trust Platform is Needed

Enterprise digital transformations are being seriously impeded by ineffective, difficult-to-secure remote working environments. Remote DevOps teams, for example, are affected by the quality of the remote access experience. Organizational security is impacted ...
Security Boulevard
organization, zero-trust, trust supply chain third-party

Zero-Trust is an Adjective Without a Noun

People love to talk about zero-trust right now, for a number of reasons. It has the word “zero” in there, which has some history in the information security world (e.g., zero-day vulnerabilities) ...
Security Boulevard
Barracuda Dell data center risk fintech ransomware zero-trust data security

Zero-Trust at the Data Layer

Often, ideas are ahead of their time. In October 2017, IDC’s Simon Piff and Hugh Ujhazy published a paper positing that data was the new endpoint. There is good chance that, in ...
Security Boulevard
Log4j zero-trust API Menlo Security compromised

Menlo Security Poll Finds Resistance to Ransom Demands

A poll of 8,571 individuals conducted on Twitter by Menlo Security suggests business and IT leaders are becoming more inclined to accept financial losses rather than cave to ransomware demands. A full ...
Security Boulevard
ransom networking ransomware

Rethinking Networking to Derail Ransomware

Despite the best efforts of many organizations, ransomware attacks are still on the rise; perhaps indicating that those “best efforts” are just not good enough. Take, for example, the recent ransomware attack ...
Security Boulevard
Netskope cloud security Public Clouds Spread Malware

Cloud Complexity Rattles Enterprise Security Efforts

More than 15 months after the pandemic-driven rush to remote work, enterprises are still paying the price for the faster-than-previously-planned migration to the cloud. According to the 2021 Thales Global Threat Report ...
Security Boulevard
zero-trust ZTNA digital identities

Is Your ZTNA Vendor Really Zero-Trust?

A recent article defined ZTNA (zero-trust network access) and delivered recommendations on how to get the best results from ZTNA. The piece also touched on the importance of selecting a zero-trust vendor ...
Security Boulevard