Bring your own device (BYOD) policies are a great example of deperimeterization and the principles of Zero Trust.Continue reading
WebFeedsForCorpSite
Threat Spotlight: Malicious HTML attachments
Barracuda researchers recently analyzed data on millions of attachments scanned over the past month to identify which are most likely to be malicious.Continue reading
Threat Spotlight: Attempts to exploit Atlassian Confluence zero day
Barracuda researchers have observed a steady flow of attacks on the zero-day vulnerability in Atlassian Confluence. These attacks are expected to continue through the near future.Continue reading
What is Zero Trust?
Zero Trust security is the best way to protect your networks, data, applications, and employees. Why is there so much resistance?Continue reading
CSA identifies top 11 cloud security impediments
Cloud security is a significant concern, but organizations continue to deploy cloud workloads without including security in the development process.Continue reading
Cyber insurance creates virtuous security cycle
Cyber insurance providers require companies to meet specific security standards, which is leading to an overall improvement in the state of cybersecurity.Continue reading
App security delivers unexpected benefit
Watch this 3-minute testimonial from the IT Director for a major European retailer about benefits she's gotten from application security. Continue reading
Below the Surface: Insights from two IT directors
On the next Below the Surface, Olesia Klevchuk will be talking with Timika Hite, Sr. Director of Information Technology at LA Family Housing, and David Price, IT Director at Curtins.Continue reading