Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

tiktok security portnox
TikTok Security Concerns in the Workplace
TikTok, the viral social media app centered around short videos and owned by the Chinese company ByteDance, is coming under intense scrutiny. By now, many of us have seen a TikTok video filmed in someone’s workplace—those “day in the life” clips or rants about coworkers, supervisors, or customers. Or you may have seen a video…
Read more»
Everything You Need to Know About Certificate-Based Authentication
No ID? No Entry. Certificate-based authentication is a way for a computer system to verify your identity using a digital certificate instead of a traditional username and password. Think of it like a driver’s license. When you go to a bar or a liquor store, you need to prove that you’re old enough to buy…
Read more»
How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more»
rogue api security portnox
Things to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse.  A security breach could result in the leaking of sensitive customer data such…
Read more»
iam security portnox
How Cloud IAM Security Vulnerabilities Are Being Exploited
What is IAM Security? IAM is an abbreviation for identity access management. Identity access management systems allow your organization to manage employee applications without checking in to each app as an administrator. IAM security solutions allow organizations to manage a variety of identities, including people, software, and hardware.   IAM Infrastructure Over the past few years, businesses…
Read more»
principle of least privilege portnox
How to Leverage the Principle of Least Privilege for Stronger Network Security
The principle of least privilege (PoLP) is an information security concept that gives applications or users minimum required network permissions to perform their jobs. Therefore, PoLP is an important aspect of privilege access management (PAM).  Implementing the principle of least privilege provides network security by avoiding needless exposure. For example, a user and employee access…
Read more»
passwordless authentication portnox
Passwordless Authentication: A Paradigm Shift in Security
Passwordless authentication appears to be the new belle of the ball amongst tech experts. Of course, the reasons all bother on the general challenges experienced by security companies and businesses. 
Read more»
Filling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read more»
identity threat detection and response portnox
Identity Threat Detection & Response (ITDR): What You Need To Know
Leading research firm Gartner has highlighted Identity Threat Detection and Response (ITDR) as one of the top cybersecurity trends of 2022, along with digital supply chain risk, attack surface expansion, and others. But what exactly is ITDR, and why is it important for organizations in 2022 and beyond?  What is Identity Threat Detection & Response? …
Read more»
it security budgets portnox
How CISOs Can Stretch IT Security Budgets
The global annual cost of cybercrime is now an eye-watering $6 trillion. To put this into perspective, if cybercrime were a country, it would be the world’s third-largest economy after the US and China.   The cybercrime landscape has changed dramatically over the last decade. For example, ransomware was 57 times more destructive in 2021 than…
Read more»
vulnerability management portnox
Risk-Based Vulnerability Management Challenges & Solutions to Overcome Them
In today’s cyber landscape, efficient vulnerability management is a top priority. Organizations cannot afford to take chances with cyber-attacks on the rise and the increasing sophistication of malicious actors. Unfortunately many hold the wrong perspective of vulnerability management (VM) which can cause  recurring security challenges and  for organizations.  In many cases targeted threat actors or…
Read more»
risk-based security portnox
Shifting From a Severity-Focused to Risk-Based Network Security Model
Organizations handle cybersecurity issues from varying perspectives. It is the precise reason they apply different strategies for fulfilling security objectives. The goal notwithstanding, one essential element to consider is combating the compounding surge in vulnerabilities. While fixing all may look like a ‘wild goose chase,’ adopting a sustainable approach is the way to go.  At…
Read more»