Lazarus Cryptocurrency Hacks Estimated To Be $3 Billion

Threat actors from North Korea have been increasingly targeting the cryptocurrency sector since 2017 as a source of generating revenue.  Reports have claimed that the country’s ruling elite and computer science professionals ...
Zero Trust Should Not Give IT a Bad Name

Zero Trust Should Not Give IT a Bad Name

Maybe you've just found out that your company's IT organization is implementing Zero Trust. Does that mean they don't trust you? "Zero Trust" sure sounds that way. Maybe you've read about it ...
All Access Is (or Should Be) Remote Access

All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work ...
Zero Trust Network Access Is an Oxymoron

Zero Trust Network Access Is an Oxymoron

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same ...
Zero Trust: Not As Scary As It Sounds

Zero Trust: Not As Scary As It Sounds

If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked ...
Zero Trust: The Protection Model for the Post-Pandemic World

Zero Trust: The Protection Model for the Post-Pandemic World

One year and a half following the start of the COVID-19 pandemic, we're seeing most companies either maintaining their remote work policies or slowly moving to a hybrid model. In fact, an ...
exec-order1.png

The Countdown Has Started — The Move Toward Zero Trust and MFA

In early May 2021, the President of the United States issued an executive order on cybersecurity, and though it will take some time for executive branch agencies to develop formal rules, the ...
Trusting Locations Bites Us Yet Again

Trusting Locations Bites Us Yet Again

Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020 ...
Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference

CISA Emergency Directive 21-03: VPN Vulnerabilities Actively Exploited

On April 20, 2021, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) released an alert on the exploitation of Pulse Connect Secure Vulnerabilities with Alert AA21-110A: Exploitation of Pulse ...
Screen Shot 2021-04-26 at 1.39.00 PM.jpg

Observed Changes to the Threat Landscape in 2020

Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the ...

Secure Guardrails