zero trust
Cloud Repatriation Impacts on Resources and Cybersecurity
Nik Hewitt | | advice, Best Practices, Cloud, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, visibility, zero trust
The cloud repatriation surge and the impact on SOS resources and business cybersecurity In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation. This movement ...
Zero-Trust Network Access: Why so Many Teams Get it Wrong
Charlie Gero | | cybercrime, Cybersecurity, identitty management, identity governance administration, Infosec, microsegmentation, Ransomware, zero trust, ZTNA
Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ...
Security Boulevard
Navigating the NSA’s New Zero-Trust Guidelines
New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
Security Boulevard
The Importance of Compliance Hardening
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...
CVE-2024-21412 Vulnerability Reported in Defender SmartScreen
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, vulnerability, zero trust
Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...
New Phishing Campaign Delivers Remote Access Trojans (RATs)
Nik Hewitt | | Best Practices, lateral movement, next gen security, Phishing, security, Security Research, Security Training, zero trust
Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
Why Application Segmentation is a Business Essential
Nik Hewitt | | advice, application protection, application-centric, applications, Best Practices, Cybersecurity, lateral movement, microsegmentation, network segmentation, Security Research, Uncategorized, zero trust
Why is application segmentation so important for solid cybersecurity protection? Application segmentation plays a crucial role in organizational cybersecurity for several compelling reasons. Individually segmenting our numerous applications involves dividing a network’s ...
What is Micro Breaching?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Security Research, visibility, zero trust
What is micro breaching, and how can organizations defend themselves? Not all attacks make headlines with massive data leaks or crippling ransomware attack impacts. Enter the realm of “micro breaching,” a subtle ...
The Keystone of Modern Authentication in a Zero Trust World part 2 — How Safe Is Your Smartphone?
The Keystone of Modern Authentication in a Zero Trust World part 2 — How Secure Is Your Smartphone? Unveiling the Depths of Security & IntegrityIn our previous blog post, we delved into the pivotal ...
What is GRC, and Why is it Important for Cybersecurity?
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, TrueFort, visibility, zero trust
Within cybersecurity, what is GRC, and why is it so important? GRC is a benchmark for structured strategy, encompassing governance, risk, and compliance. These are important CISO responsibilities and as critical for ...