Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Combat Ransomware with Zero Trust Data Security

Can’t see the forest through the trees. Can’t tell the ransomware from the apps. Can’t contain the malware if you can only see parts of the network. Ransomware hackers have several different tools in their toolbelt to gain access to a computer and then a network. Common exploits include email phishing campaigns, remote desktop protocol (RDP) vulnerabilities, and software vulnerabilities.

The Essential Steps of a Successful Zero Trust 'Journey' for Federal Agencies

By Nate Smolenski In May, the National Institute of Standards and Technology (NIST) released the white paper, “Planning for a Zero Trust Architecture,” which illustrates how agencies can make this transition by leveraging the seven steps of the NIST Risk Management Framework (RMF): Prepare, categorize, select, implement, assess, authorize, and monitor.

Move On Up: Applying Zero Trust Design to the Office

Moving to a new home is listed as one of the main stressors in life. When organizations switch offices to accommodate business needs, moving can also be a major stressor for IT teams — but it doesn’t need to be. Not too long ago we moved our Boston office to a new location, one of our major engineering hubs, where many of our engineers and IT members work.

Featured Post

Zero Trust is not a shortcut to security

According to a recent Microsoft report, Zero Trust is now 'the top security priority' for 96% of the interviewed security decision makers, while 76% said they were currently in the process of implementation. Microsoft's report also says that the biggest challenges facing adoption are perceived investment and effort to achieve the principle in practice. Sounds familiar, but the reality of Zero Trust is that, for the most part, it's nothing new.

Is the EU Cyber Resilience Act Really Possible Without Zero Trust Automation?

In May 2021 President Joe Biden issued out Executive Order 14028. The order focused on “Improving the Nation’s Cybersecurity” to support and protect the nation’s critical infrastructure and Federal Government networks. This directly relates to the trustworthiness and transparency in ALL digital infrastructure – IT, OT, IoT, IIoT.

Zero Trust Summit Fireside Chat with Jim Dolce

Jim Dolce was featured on a moderated main stage discussion, alongside Francis Rose, at the Zero Trust Summit in Washington, D.C. This engaging conversation examined how to secure the edge to meet OMB Zero Trust requirements. The event gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust.