Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Strengthening IoT Security with Cloud-Native DHCP Listening
Enhanced IoT Fingerprinting & Security with Cloud-Native DHCP Listening More Like the Internet of Everything With the explosion of new devices connecting to the internet, IoT (or, the Internet of Things) really might as well be called IoE (or, the Internet of Everything.) The use cases for always-connected devices span across industries – from facilities…
Read more»
Why Log4Shell Remains a Major Risk for Corporate Networks.
Log4Shell is Still Lurking. What Does it Mean for Corporate Networks? What is Log4Shell & What Does it Affect? In December 2021, the Log4j vulnerability, also known as Log4Shell, was made public. Log4j is a logging utility for Java that allows developers to output log messages from their applications to various destinations, such as the…
Read more»
network security architecture portnox
Why Integrated Network Security Architecture is the Future
Integrated network security architecture refers to a unified system of different network security features across a network. It provides a systematic approach to designing and implementing a set of cybersecurity measures that are synergistic and mutually supportive to one another, to provide an increased level of protection.   With an integrated network security architecture, you can…
Read more»
rogue api security portnox
Things to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse.  A security breach could result in the leaking of sensitive customer data such…
Read more»
zero trust maturity model portnox
CISA’s New Zero Trust Maturity Model: What You Need To Know
Did you know that 74% of IT decision-makers now believe ransomware should be considered a matter of national security? Ransomware threats have skyrocketed in recent years. An eye-watering 60% of organizations fell victim to a ransomware attack last year. Undoubtedly, ransomware is cybersecurity’s most significant challenge today. So, how do organizations fight back and safeguard…
Read more»
iam security portnox
How Cloud IAM Security Vulnerabilities Are Being Exploited
What is IAM Security? IAM is an abbreviation for identity access management. Identity access management systems allow your organization to manage employee applications without checking in to each app as an administrator. IAM security solutions allow organizations to manage a variety of identities, including people, software, and hardware.   IAM Infrastructure Over the past few years, businesses…
Read more»
switch commander portnox
Introducing Switch Commander – Portnox’s Free Tool For Switch Monitoring & Management
Death by a Thousand Paper Cuts – The Daily Slog The word “hero” gets thrown around a lot, but not usually for your average Network Administrator. However, if people knew how much work it truly takes to keep your corporate network humming along (securely, of course), there would probably be a national holiday. Maybe even…
Read more»
iomt portnox
Why the Internet of Medical Things (IoMT) Needs Better Security
In today’s world,  high-security breaches face every sector, and the medical industry is no exception. The myriad of internet-connected medical devices and hospital networks  designed for the improvement of health care services, also drive the  increasing risk of security threats and vulnerabilities.   The US Food and Drug Administration (FDA) released several safety communications highlighting …
Read more»
principle of least privilege portnox
How to Leverage the Principle of Least Privilege for Stronger Network Security
The principle of least privilege (PoLP) is an information security concept that gives applications or users minimum required network permissions to perform their jobs. Therefore, PoLP is an important aspect of privilege access management (PAM).  Implementing the principle of least privilege provides network security by avoiding needless exposure. For example, a user and employee access…
Read more»
ot security portnox
Enhancing OT Security Without Disrupting Operations
What is Operational Technology? Cybersecurity has come a long way in the recent past. Its importance is felt in all aspects of modern life, both personal and industrial. The current digital and network advancements are steadily pushing Information Technology (IT) and Operational Technology (OT) towards integration. While IT systems interact with each other for data-centric…
Read more»
ransomware attacks portnox
Why Is the Healthcare Industry the Most Likely To Pay Cybercriminals for Ransomware Attacks?
Times are looking more brutal than ever for one of the world’s most critical industries. Ransomware attacks are skyrocketing, and healthcare organizations are increasingly cut off from much-needed cybersecurity insurance.   But just how bad is the situation? A recent Sophos survey found that 66% of healthcare organizations were hit with a ransomware attack in 2021,…
Read more»
quantum threats portnox
CISA Urges Organizations to Prepare For Future Quantum Threats
As the world anticipates quantum computing, many believe it has potential benefits for every industry. Equally excited and awaiting its rollout is the hacker community who could use these powerful quantum computers to compromise the digital systems we use daily including online banking and email software    The US Cybersecurity and Infrastructure Security Agency (CISA)…
Read more»