Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Navigating the Future of API Security: Trends, Challenges, and Innovations
Today, APIs can be found everywhere — at home and in mobile devices, in corporate networks and in the cloud, even in industrial environments. The emerging era of Generative AI is also entirely...
Learn more
Blog
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
Learn more
Whitepaper
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
Learn more
Event Recording
Event Recording
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Authorization (AuthZ) and Authentication (AuthN) go hand in hand in ensuring zero-trust in your system landscape. But while scaling identity can be done by centralizing it in an IAM solution,...
Learn more
Who is Responsible for Operational Technology Security?
Blog
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not...
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Future Cybersecurity Threats: Be Prepared
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
State-sponsored Cyber Attacks
Blog
State-sponsored Cyber Attacks
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase...
NIS2 Directive: Who, What, and How?
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Getting to Grips with Zero Trust Network Access Solutions
Blog
Getting to Grips with Zero Trust Network Access Solutions
A Zero Trust approach to cyber security is a concept that has been around for decades, but thanks to advances in technology and the need to adapt cyber security capabilities to support secure...
Business-Critical Web Application Firewalls
Blog
Business-Critical Web Application Firewalls
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical, something...
Securing Industrial Control Systems (ICS)
Blog
Securing Industrial Control Systems (ICS)
Cybersecurity has become essential for every modern business, but has historically focused on securing information technology (IT) used by the administrative side of the business, rather than...
Deepfakes: A Case for or Against Remote Identity Verification?
Blog
Deepfakes: A Case for or Against Remote Identity Verification?
Recently deepfakes made a splash in the headlines: Vitali Klitschko, the mayor of Kiev held one-on-one virtual interviews with several European leaders – or so they thought. In the days...
Here’s Why DDoS Attacks Have Become a Bigger Threat
Blog
Here’s Why DDoS Attacks Have Become a Bigger Threat
DDoS (Distributed Denial of Service) attacks are no longer top of mind; however, today DDoS attacks are an even bigger threat than ever before. The pandemic has accelerated digital...
The Reality of Deception for Cyber Resilience
Blog
The Reality of Deception for Cyber Resilience
"Deception is not about deceiving the enemy but causing the enemy to deceive themself". But how do you do that? Learn more about the risks and benefits of deception in cyber security with Donnie...
SentinelOne Acquires Attivo Networks: A Big Leap Forward to Security With Identity
Blog
SentinelOne Acquires Attivo Networks: A Big Leap Forward to Security With Identity
SentinelOne has announced that they will acquire Attivo Networks, a leading Distributed Deception Platform (DDP) and Identity Threat Detection & Response (ITDR) solution provider. This is a good...
1 2 3 4 5 6 7 Next