Posts tagged with "Zero Trust"



Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Data Loss Protection vs. Data Leakage Prevention
Blog | Expert's view · 26. July 2022
In a recent blog post, we introduced called Data Loss Protection (DLP), a security component and part of Zero Trust (ZT) architecture that is designed to help corporations protect information and avoid unauthorized data and document exfiltration.

IoT - Internet of Things
Blog | Expert's view · 12. July 2022
Security challenge Zero Trust (ZT) is predicated on having the proper access and users to complete multifactor authentication. How do you know that someone is the person they say they are? With the exponential growth of home-based work, boosted even further by the pandemic, more and more employees are now hired remotely, with all interviews and hiring processes conducted online using video conferencing and email. So far so good, but this does represent a potential risk of hiring a person who is...

Demystifying Cybersecurity: Cloud Infrastructure Entitlement Management (CIEM)
Blog | Expert's view · 14. June 2022
In the past, all corporate services used to be located on-premises, behind well-guarded walls. With the rise of mobile devices and the need to access all services, from anywhere, on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability.

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Blog | Expert's view · 09. March 2022
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...

Jennlog Malicious Loader
Blog | Endpoint Protection · 08. November 2021
A malicious loader named Jennlog has recently been used by an Iranian threat actor called Agrius in a ransomware attack against a university in Israel. The malware was written in .NET assembly language, and designed to target Windows® machines.

Security Maturity Model Part 2
Blog | Endpoint Protection · 19. October 2021
How do you provide cybersecurity for an already complex ecosystem? How do we keep it simple for the end-users, so they don’t circumvent protocols put in place designed to protect them and their devices? Continuing our Security Maturity Model blog series, we’re looking into the incremental needs of larger organizations, or an organization spread out globally. How do we stay secure, while still providing seamless access to resources within the ecosystem and...

FBI Attributes Ransomware Attack on Meatpacker JBS to REvil
05. July 2021
The attacks on the world’s largest meat supplier, JBS, from May 30, 2021, took place by theRansomware-as-a-Service (RaaS) group REvil (also known as Sodin/Sodinokibi), the FBI informed. Such attacks could endanger the global food supply chain, and show the vulnerable state of critical infrastructure worldwide.

Show more