The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
While many cybersecurity vendors approach zero trust from the perspective of microsegmentation, shrinking the network as much as possible, one startup thinks security needs to be as close to the data as possible and is thus focused on data storage. Maryland-based RackTop Systems boasts a Department of Defense (DoD) pedigree, giving its founders a vantage…
The Colonial Pipeline ransomware attack has been by many measures the worst to date in the history of cybersecurity, nearly crippling the Southeastern U.S. and causing the pipeline company untold millions in damages. Despite reportedly paying nearly $5 million in ransom to the DarkSide ransomware as a service group, the decryption tool provided by the…
Oil and gas companies have two key areas of concern when addressing cybersecurity, especially in their unmanned remote facilities. They have to supply physical security that denies access to the cyber-physical assets, and they sometimes must employ several cyber defenses depending on the device or system in question. So when you are looking at doing…
The U.S. Cybersecurity and Infrastructure Agency (CISA) and the FBI have issued guidance for protecting critical infrastructure from ransomware, shedding some light on the DarkSide attack that crippled the Colonial Pipeline and left much of the East Coast facing an energy shortage. The agencies didn’t name Colonial in the alert, referring only to a “pipeline…
Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. Enter authorization-focused OAuth 2.0 and authentication-focused OpenID Connect (OIDC). In the last decade, organizations adopted OAuth and its companion OIDC to enable customers…
Zero trust has gone from new idea to buzzword and industry paradigm in a decade. Much more than a one size fits all product or service, zero trust requires an organization to identify its most sensitive assets, monitor traffic flows, and enforce granular, application-level access policies–all of which are entirely dependent on your organization. As…
In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Microsegmentation is about identifying your organization’s most valuable network segments, establishing strict communication policies, and becoming the master of your network flows. Unlike traditional network segmentation,…
Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security services provider (MSSP) is an attractive solution. Managed Security Information and Event Management (SIEM) systems are a good way to accomplish that.…
A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an estimated 9.9 billion Internet of Things (IoT) devices. By 2025, we expect 21.5 billion. As more information about IoT device…
The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…