Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
Posts by Category:
- Security
- Access
- Auditing
- Policy
- Privileged Access Management
- Zero Trust
- SOC 2
- DevOps
- Compliance
- Authentication
- Identity and Access Management
- Databases
- Compare
- Team
- Product
- Integrations
- AWS
- Podcasts
- Productivity
- Kubernetes
- SSH
- HIPAA
- ISO 27001
- Dynamic Access Management
- Engineering
- Observability
- Role-Based Access Control
- Secure Access Service Edge
- Webinars
- Events
- NIST
- Onboarding
- Passwordless
- Offsites
- Platform
- PCI
Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
In this article, we’ll review what SD-WAN is, its history and development, as well as the key benefits and limitations of SD-WAN deployment. You’ll learn the difference between SD-WAN and WAN, VPNs, MPLS, and SDN and how the different services and solutions compare.
In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
Lateral movement is when an attacker gains initial access to one part of a network and then attempts to move deeper into the rest of the network — typically via remote desktop tools or remote administration tools (RATs).
Marketing Coordinator Meghan Stephan is a classically-trained singer whose performance venues have ranged from intimate church weddings to professional football games. In today’s interview, she shares her early forays into music, her experience auditioning for The Voice, and an unexpected link between singing and her marketing career.
Sienna Gordon spent a year solo traveling the world. With a tight budget and a big sense of adventure, she slept in monasteries, zipped through tea fields, and even helped MedEvac someone to safety! Her big takeaway from the experience? There are a lot of nice people in the world. I think it’s fair to say that Sienna is one of them.
Network segmentation is key to a modern security posture. Boost your network security and improve performance with these network segmentation tips.
I thought I had solved the biggest problems in the cloud, so I shifted into the background to watch the next evolutions of technology pass me by. I had the comfortable couch, the latest game console, and plenty of time to regret the true state of my adult gaming reflexes. I thought I was done. I was wrong.