Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Strengthening IoT Security with Cloud-Native DHCP Listening
Enhanced IoT Fingerprinting & Security with Cloud-Native DHCP Listening More Like the Internet of Everything With the explosion of new devices connecting to the internet, IoT (or, the Internet of Things) really might as well be called IoE (or, the Internet of Everything.) The use cases for always-connected devices span across industries – from facilities…
Read more»
iot device management portnox
IoT Device Management & The Critical Role of NAC 
Introduction  IoT (Internet of Things) is a revolutionary technology with tremendously promising potential impact. It has grown exponentially, from industry to home, and the number of IoT devices will likely keep rising. However, this new technology also raises security concerns. As these devices become prevalent in the public sector and the home, IT specialists must…
Read more»
iomt portnox
Why the Internet of Medical Things (IoMT) Needs Better Security
In today’s world,  high-security breaches face every sector, and the medical industry is no exception. The myriad of internet-connected medical devices and hospital networks  designed for the improvement of health care services, also drive the  increasing risk of security threats and vulnerabilities.   The US Food and Drug Administration (FDA) released several safety communications highlighting …
Read more»
ot security portnox
Enhancing OT Security Without Disrupting Operations
What is Operational Technology? Cybersecurity has come a long way in the recent past. Its importance is felt in all aspects of modern life, both personal and industrial. The current digital and network advancements are steadily pushing Information Technology (IT) and Operational Technology (OT) towards integration. While IT systems interact with each other for data-centric…
Read more»
ransomware attacks portnox
Why Is the Healthcare Industry the Most Likely To Pay Cybercriminals for Ransomware Attacks?
Times are looking more brutal than ever for one of the world’s most critical industries. Ransomware attacks are skyrocketing, and healthcare organizations are increasingly cut off from much-needed cybersecurity insurance.   But just how bad is the situation? A recent Sophos survey found that 66% of healthcare organizations were hit with a ransomware attack in 2021,…
Read more»
iot cyber threats portnox
New Cyber Threats & Vulnerabilities Brought on by the Rise of IoT Devices
Diving into Internet of Things Statistics An Internet of Things (IoT) device simply means a device which can communicate back and forth with a central hub, mainly via WiFi but also using technologies such as SIM cards and radio frequencies. We are living in the age of digital connectivity, if it can have an IP…
Read more»
cyber security essentials
The 3 Key Areas in Cyber Security Today
Cyber security is a market plagued by acronyms, especially on the networking side. This doesn’t simplify matters. The real problem is that the security technology landscape, like its lingo, is too complex. How can anyone with their back against the wall make sense of the options presented to them in the Cyberscape? The reality is…
Read more»
device proliferation byod
Winning the War Against Hackers in the Face Of Device Proliferation
Expanding Network Edges & Device Proliferation With the advent of COVID-19, an enormous push to hybrid work changed the threat landscape. Many more activities have become remote, and therefore more reliant on and demanding of secure remote network connections. As more organizations expand their hybrid workforce models, the network edge continues to push out and…
Read more»
secure access service edge
Is Secure Access Service Edge the Future of Network Security?
All Hail, SASE! SASE, pronounced “sassy”, stands for Secure Access Service Edge. It is a cloud-based network security model and category, proposed by Gartner in 2019. This model includes the network security solutions in a global and cloud-native service that allows IT teams to easily connect and secure all of their organization’s networks and users…
Read more»
Your Castle has No Walls! All Hail, Zero Trust
Why today’s boundless company networks are like castles without walls being protected by network security systems stuck in the middle ages. Today, your network is likely comprised of your LAN, MPLS, SD-WAN, employees’ homes, Azure, Starbucks, Marriott, any airport…you get the idea. Your network extends to wherever authorized devices connect to gain access to company…
Read more»
What Kind of WiFi Protected Access Should You Use to Secure Your Enterprise?
When examining WiFi security, the first layer of defense is the method being used to authenticate to the network. The most widely used methods of authentication are Open authentication, WPA2-PSK (Pre-Shared Key) and WPA2-Enterprise (read more about WPA protocols below). Below, we examine these different options for WiFi protected access. Other authentication methods such as…
Read more»
iot security challenges
Top 5 Proactive Solutions to IoT Security Challenges
Originally published on published IoT Agenda. A couple of years ago, an employee was fired from a position with a large food retailer in the United States. This event might have gone unnoticed had it not been for the fact that this disgruntled employee decided to get even. He knew the password to the organization’s…
Read more»