Infosec

Minimize Your Attack Surface with CloudConnexa™ Device Identity Verification & Enforcement (DIVE)
Cloud Connexa Device Identity Verification & Enforcement (DIVE) gives administrators the power to leverage one of the key principles of Zero Trust Network Access (ZTNA) — Least Privilege — granting access to only the resources a user should have, from only the devices they are authorized to use. When combined with the inherent Cloud Connexa micro-segmentation and identity-based access controls, DIVE further minimizes the attack surface.
April 18, 2023
Read More

Three Ways to Integrate Device Posture Checks With Your VPN
In today's increasingly mobile and BYOD workforce, ensuring employees use secure devices when connecting to corporate networks is more critical than ever. Device posture information can help you identify and mitigate security risks in your business by ensuring that devices are updated with security patches, have antivirus software installed, and are not jailbroken or rooted.
April 4, 2023
Read More

Anonymity, Privacy, and Security
Often, when I'm involved in discussions on various forums and discussion threads related to security and privacy on the Internet, I'm surprised how many people use the terms “anonymity,” “privacy,” and “security” interchangeably. These are actually three very different ideas, although they do have some overlapping aspects. Let's dive into the definition of each word to see how they differ.
March 28, 2023
Read More

ZTNA — Beyond the Acronym
The traditional methods of ensuring secure communications across your organization can be overly complex and expensive for a myriad of reasons. ZTNA (Zero Trust Network Access) reduces the surface area prone to attack by following zero trust tenets to provide access to applications.
September 20, 2022
Read More

SOX Cybersecurity Compliance
The Sarbanes-Oxley Act (SOX) is a federal act passed in 2002 following financial scandals at Enron Corp., Tyco International, and WorldCom. Here's what you need to know.
June 16, 2022
Read More

What is LDAP?
In 1993, LDAP was introduced, allowing applications to access and authenticate specific user information across directory services. It also works on both public networks and private intranets. This user-friendly language is one of the easiest ways to access, modify, and authenticate information in virtually any directory.
June 7, 2022
Read More

3 Current Phishing Techniques That Put Your Business at Risk
Phishing is a perennial cyber risk for businesses and organizations of every size, in every industry. It’s a popular social engineering method designed to fool recipients into clicking malicious links, providing hackers access to their networks, or divulging Personally Identifiable Information (PII) or sensitive company data like credentials or financial information. Phishing attacks exploit the […]
June 2, 2022
Read More

Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain
We all know ransomware is among the top threats facing today’s organizations. The bad news is that the developers behind the malware they use are constantly innovating. In fact, some variants can encrypt 100,000 files in little as five minutes.
May 26, 2022
Read More
Beating BEC with People, Process and Technology
Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today.
May 19, 2022
Read More
The Lapsus$ Group: Who They Are and How to Protect Your Business
Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to constantly be moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others.
May 17, 2022
Read More