Posts by Michael Marvin
How to Leverage the Principle of Least Privilege for Stronger Network Security
The principle of least privilege (PoLP) is an information security concept that gives applications or users minimum required network permissions to perform their jobs. Therefore, PoLP is an important aspect of privilege access management (PAM). Implementing the principle of least privilege provides network security by avoiding needless exposure. For example, a user and employee access…
Read MorePortnox Debuts First Cloud-Native IoT Fingerprinting and Profiling Solution
Zero Trust Security Leader Brings Lightweight, Easy-to-Use IoT Security Capabilities to the Enterprise and Mid-Market Austin, TX – October 12, 2022 — Portnox, a proven leader in cloud-native, zero trust access and endpoint security solutions, today announced the general availability of the first cloud-native IoT security solution to help mid-market and enterprise businesses address rising Internet of…
Read MoreWhy Is the Healthcare Industry the Most Likely To Pay Cybercriminals for Ransomware Attacks?
Times are looking more brutal than ever for one of the world’s most critical industries. Ransomware attacks are skyrocketing, and healthcare organizations are increasingly cut off from much-needed cybersecurity insurance. But just how bad is the situation? A recent Sophos survey found that 66% of healthcare organizations were hit with a ransomware attack in 2021,…
Read MoreImplementing & Maintaining a Zero Trust Security Model for Your Enterprise
Protecting a company’s assets is becoming quite expensive. Many enterprises often carefully assess potential new solutions before deciding to venture into the technology. However, as costly as some of these solutions come, protecting all digital assets remains paramount. The zero trust security model has in fact been around for years. It is a strategy that…
Read MoreCommon SD-WAN Challenges & How to Avoid Them
A Software-Defined Wide Area Network (SD-WAN) enables organizations to rely on a combination of transport services. The increasing use of SD-WAN for connecting enterprise networks improves productivity, reduces cost, and increases application performance. It is a feature-packed technology that centralizes security, management, networking, and more. Consequently, organizations with cloud solutions view SD-WAN as an infrastructure…
Read MoreHow To Use SASE To Establish & Enable Zero-Trust Network Access
As working environments evolve, we must rethink our network security approach. The traditional “castle-and-moat” network security model, where everyone inside the network is trusted by default, but no one outside can access the data inside, is no longer fit for purpose. Faced with cloud computing, virtualization, and remote working, having a clear perimeter protecting a…
Read MoreFilling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read MoreIdentity Threat Detection & Response (ITDR): What You Need To Know
Leading research firm Gartner has highlighted Identity Threat Detection and Response (ITDR) as one of the top cybersecurity trends of 2022, along with digital supply chain risk, attack surface expansion, and others. But what exactly is ITDR, and why is it important for organizations in 2022 and beyond? What is Identity Threat Detection & Response? …
Read MoreCybersecurity Legislation: What US Organizations Need To Know About CIRCIA Compliance
There’s no shortage of high-profile cybersecurity incidents hitting the news every week. In 2021, we saw a leading energy supplier shut down a major eastern US fuel pipeline in response to a cyber attack. In the same year, a major US insurance carrier fell victim to a costly ransomware attack that resulted in thousands of…
Read More5G Network Security: What You Need to Know
The emergence of 5G wireless technology is no longer news to the world. Organizations and cyber security experts alike look forward to its higher speed, increased capacity, and lower latency. The 5G wireless network also boasts interactive applications, improved communication, increased labor productivity, and lower costs. Moreover, 5G intends to provide more extensive broadband access…
Read MoreHow To Protect Your Enterprise Network From Zero-Day Attacks
When it comes to cyber security, no organization can be too careful as cybercriminals actors are constantly crafting new ways to hack networks. To effectively guard against them enterprises should focus on mitigating all known gaps in their network security posture. Of the most notable vulnerabilities is the zero-day exploit. If an organization already has…
Read MoreRisk-Based Vulnerability Management Challenges & Solutions to Overcome Them
In today’s cyber landscape, efficient vulnerability management is a top priority. Organizations cannot afford to take chances with cyber-attacks on the rise and the increasing sophistication of malicious actors. Unfortunately many hold the wrong perspective of vulnerability management (VM) which can cause recurring security challenges and for organizations. In many cases targeted threat actors or…
Read More