Staff Articles

Leading Through Crisis: Managing a Cybersecurity Incident

Cyber attacks are on the rise, and it seems every year they take new forms. Ransomware is getting more expensive. IoT attacks alone are expected to double by 2025. Taking steps to mitigate these risks is essential, of course, but on the other side of that coin — it’s also essential to prepare for when […]
March 20, 2024
Read More

Have Extranets Become Extinct?

In today's fast-paced and interconnected business landscape, collaboration between organizations, partners, suppliers, and customers plays a crucial role in driving success. Traditionally, extranets have served as a secure means of facilitating communication and information exchange between two organizations. However, with the rise of modern technologies, the relevance of traditional extranets has been called into question. In the latest expert blog post from our Product team, we explore the changing landscape of extranets, the emergence of modern collaboration platforms, and how the Cloud Connexa AppHub is revolutionizing the way organizations interact and share access to private applications.
October 23, 2023
Read More

Lateral Movement: What It Is & How to Prevent It

Lateral movement is the most common way attackers access sensitive data. Alongside other controls, ZTNA can provide effective protection against lateral movement. Learn how to protect your business from lateral movement attacks here.
August 9, 2023
Read More

Anonymity, Privacy, and Security

Often, when I'm involved in discussions on various forums and discussion threads related to security and privacy on the Internet, I'm surprised how many people use the terms “anonymity,” “privacy,” and “security” interchangeably. These are actually three very different ideas, although they do have some overlapping aspects. Let's dive into the definition of each word to see how they differ.
March 28, 2023
Read More