Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more»
Strengthening IoT Security with Cloud-Native DHCP Listening
Enhanced IoT Fingerprinting & Security with Cloud-Native DHCP Listening More Like the Internet of Everything With the explosion of new devices connecting to the internet, IoT (or, the Internet of Things) really might as well be called IoE (or, the Internet of Everything.) The use cases for always-connected devices span across industries – from facilities…
Read more»
Why Log4Shell Remains a Major Risk for Corporate Networks.
Log4Shell is Still Lurking. What Does it Mean for Corporate Networks? What is Log4Shell & What Does it Affect? In December 2021, the Log4j vulnerability, also known as Log4Shell, was made public. Log4j is a logging utility for Java that allows developers to output log messages from their applications to various destinations, such as the…
Read more»
ztna shortcomings portnox
Why Do ZTNA Solutions Fall Short When It Comes to Zero Trust?
ZTNA & Zero Trust Zero Trust is a security architecture in which every individual, inside or outside the organization’s network, must be authenticated, authorized, and continually validated for data security configuration and posture before accessing or maintaining access to information and resources.   Zero Trust Network Access (ZTNA) is one of the ways of implementing Zero…
Read more»
network security architecture portnox
Why Integrated Network Security Architecture is the Future
Integrated network security architecture refers to a unified system of different network security features across a network. It provides a systematic approach to designing and implementing a set of cybersecurity measures that are synergistic and mutually supportive to one another, to provide an increased level of protection.   With an integrated network security architecture, you can…
Read more»
rogue api security portnox
Things to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse.  A security breach could result in the leaking of sensitive customer data such…
Read more»
zero trust maturity model portnox
CISA’s New Zero Trust Maturity Model: What You Need To Know
Did you know that 74% of IT decision-makers now believe ransomware should be considered a matter of national security? Ransomware threats have skyrocketed in recent years. An eye-watering 60% of organizations fell victim to a ransomware attack last year. Undoubtedly, ransomware is cybersecurity’s most significant challenge today. So, how do organizations fight back and safeguard…
Read more»
portnox ransomware crisis
The Impacts of the Ransomware Crisis on IT Teams
It’s no secret that IT teams are on the front lines of a rapidly evolving cyber-threat landscape. The ransomware crisis is raging, with attacks escalating in frequency, magnitude, and sophistication. This has impacted IT teams in multiple ways, including increased pressure to keep pace with the latest threats, complicating existing data protection efforts, and hindering…
Read more»
iam security portnox
How Cloud IAM Security Vulnerabilities Are Being Exploited
What is IAM Security? IAM is an abbreviation for identity access management. Identity access management systems allow your organization to manage employee applications without checking in to each app as an administrator. IAM security solutions allow organizations to manage a variety of identities, including people, software, and hardware.   IAM Infrastructure Over the past few years, businesses…
Read more»
iot device management portnox
IoT Device Management & The Critical Role of NAC 
Introduction  IoT (Internet of Things) is a revolutionary technology with tremendously promising potential impact. It has grown exponentially, from industry to home, and the number of IoT devices will likely keep rising. However, this new technology also raises security concerns. As these devices become prevalent in the public sector and the home, IT specialists must…
Read more»
switch commander portnox
Introducing Switch Commander – Portnox’s Free Tool For Switch Monitoring & Management
Death by a Thousand Paper Cuts – The Daily Slog The word “hero” gets thrown around a lot, but not usually for your average Network Administrator. However, if people knew how much work it truly takes to keep your corporate network humming along (securely, of course), there would probably be a national holiday. Maybe even…
Read more»
iomt portnox
Why the Internet of Medical Things (IoMT) Needs Better Security
In today’s world,  high-security breaches face every sector, and the medical industry is no exception. The myriad of internet-connected medical devices and hospital networks  designed for the improvement of health care services, also drive the  increasing risk of security threats and vulnerabilities.   The US Food and Drug Administration (FDA) released several safety communications highlighting …
Read more»