Staff Articles
Leading Through Crisis: Managing a Cybersecurity Incident
Cyber attacks are on the rise, and it seems every year they take new forms. Ransomware is getting more expensive. IoT attacks alone are expected to double by 2025. Taking steps to mitigate these risks is essential, of course, but on the other side of that coin — it’s also essential to prepare for when […]
March 20, 2024
Read More
Have Extranets Become Extinct?
In today's fast-paced and interconnected business landscape, collaboration between organizations, partners, suppliers, and customers plays a crucial role in driving success. Traditionally, extranets have served as a secure means of facilitating communication and information exchange between two organizations. However, with the rise of modern technologies, the relevance of traditional extranets has been called into question.
In the latest expert blog post from our Product team, we explore the changing landscape of extranets, the emergence of modern collaboration platforms, and how the Cloud Connexa AppHub is revolutionizing the way organizations interact and share access to private applications.
October 23, 2023
Read More
Lateral Movement: What It Is & How to Prevent It
Lateral movement is the most common way attackers access sensitive data. Alongside other controls, ZTNA can provide effective protection against lateral movement. Learn how to protect your business from lateral movement attacks here.
August 9, 2023
Read More
Anonymity, Privacy, and Security
Often, when I'm involved in discussions on various forums and discussion threads related to security and privacy on the Internet, I'm surprised how many people use the terms “anonymity,” “privacy,” and “security” interchangeably. These are actually three very different ideas, although they do have some overlapping aspects. Let's dive into the definition of each word to see how they differ.
March 28, 2023
Read More