You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…
Introduction So you have this highly sophisticated and powerful firewall on your network with all the bells and whistles turned on. And considering how much…
On Monday, Jan 6th, DHS warned US organizations about potential cyber-attacks from Iran and Iran-backed APT groups. The CISA alert was the first public acknowledgment…
VNF, or Virtualized Network Function, refers to the process of virtualizing traditional networking and security functions into services. In practical terms, this means running several…
Gartner predicts that by 2023, 93% of organizations will be doing some form of SDWAN for the WAN edge. And the reasons for this disruption…
The ATT&CK framework developed by MITRE expands on the last three steps of the kill chain by giving us twelve more granular categories to replace the installation, command and control, and actions and objectives phase of the kill chain
The AWS shared responsibility models states that the customer is responsible for security in the cloud.In this article, we’ll go over some VPC basics – along with how we can design proper segmentation and modern security concepts to our virtual private cloud.
Zero trust Security is an architecture for today’s modern networks. New technologies like the Software Defined Perimeter have finally brought the concept to reality.
An undersized firewall can be catastrophic to your network performance, availability and security posture. As the gatekeeper of what goes in and out of your network, picking the appropriate size for your environment can make or break your network and security objectives
Post detection tools like EDR, UEBA and Sandboxing are all NextGen features that will soon become stables in endpoint protection suite.