Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Blog, Cyber Threats, Network Security, Networking, Zero-Trust
NIST Releases New AI Risk Framework to Combat Emerging Threats from Malicious AI
NIST's AI Risk Management Framework aims to mitigate threats from malicious AI while ensuring the development of trustworthy AI systems.
Read more» Authentication & Policy, Blog, Cyber Threats, Portnox academy
Understanding the Ins & Outs of Cyber Risk Quantification
Introduction In today’s digital world, cyber risk is high and growing. The best way to control this risk is with a proactive cyber security strategy that quantifies and measures your company’s vulnerability to theft, fraud, or data breach. The cyber threat landscape is diverse, and there is a wide range of potential threats in this…
Read more» Authentication & Policy, Blog, Cyber Threats, Portnox academy, Zero-Trust
How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more» Cyber Threats, Network Security
Why Log4Shell Remains a Major Risk for Corporate Networks.
Log4Shell is Still Lurking. What Does it Mean for Corporate Networks? What is Log4Shell & What Does it Affect? In December 2021, the Log4j vulnerability, also known as Log4Shell, was made public. Log4j is a logging utility for Java that allows developers to output log messages from their applications to various destinations, such as the…
Read more» Blog, Cyber Threats, Network Security
Things to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse. A security breach could result in the leaking of sensitive customer data such…
Read more» Blog, Cyber Threats, Ransomware
The Impacts of the Ransomware Crisis on IT Teams
It’s no secret that IT teams are on the front lines of a rapidly evolving cyber-threat landscape. The ransomware crisis is raging, with attacks escalating in frequency, magnitude, and sophistication. This has impacted IT teams in multiple ways, including increased pressure to keep pace with the latest threats, complicating existing data protection efforts, and hindering…
Read more» Blog, Cloud, Cyber Threats, Network Security
How Cloud IAM Security Vulnerabilities Are Being Exploited
What is IAM Security? IAM is an abbreviation for identity access management. Identity access management systems allow your organization to manage employee applications without checking in to each app as an administrator. IAM security solutions allow organizations to manage a variety of identities, including people, software, and hardware. IAM Infrastructure Over the past few years, businesses…
Read more» Blog, Cyber Threats, IoT
IoT Device Management & The Critical Role of NAC
Introduction IoT (Internet of Things) is a revolutionary technology with tremendously promising potential impact. It has grown exponentially, from industry to home, and the number of IoT devices will likely keep rising. However, this new technology also raises security concerns. As these devices become prevalent in the public sector and the home, IT specialists must…
Read more» Blog, Cyber Threats, IoT, Network Security, Ransomware
Why Is the Healthcare Industry the Most Likely To Pay Cybercriminals for Ransomware Attacks?
Times are looking more brutal than ever for one of the world’s most critical industries. Ransomware attacks are skyrocketing, and healthcare organizations are increasingly cut off from much-needed cybersecurity insurance. But just how bad is the situation? A recent Sophos survey found that 66% of healthcare organizations were hit with a ransomware attack in 2021,…
Read more» Blog, Cyber Threats, Network Security
CISA Urges Organizations to Prepare For Future Quantum Threats
As the world anticipates quantum computing, many believe it has potential benefits for every industry. Equally excited and awaiting its rollout is the hacker community who could use these powerful quantum computers to compromise the digital systems we use daily including online banking and email software The US Cybersecurity and Infrastructure Security Agency (CISA)…
Read more» Blog, Cyber Threats, Network Security
If Only They Had a NAC…Understanding the Cisco Hack
Cisco recently confirmed they were the victim of a data breach in which hackers were able to steal 2.8 GB of data. Although these breaches are nothing new (SolarWinds, Credit Suisse, Twitter, the list goes on…) the Cisco breach is especially concerning because many organizations rely on Cisco products to keep their networks safe. The…
Read more» Blog, Cyber Threats, Network Security
You Were the Victim of a Data Breach. Now What?
A data breach is something every individual and organization needs to avoid. Unfortunately, it has become all too common in today’s online world. One major way that personal information becomes compromised is through identity theft. It’s better not to imagine the extent of damage that goes along with that. In this highly-connected world, cybersecurity…
Read more»