Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

How the Zero Trust Security Model Is Evolving To Stop Cyber Threats
Zero trust has evolved to become a practically fail-proof security model – serving as a more effective, risk-based solution for stopping malicious threats.
Read more»
NIST Releases New AI Risk Framework to Combat Emerging Threats from Malicious AI
NIST's AI Risk Management Framework aims to mitigate threats from malicious AI while ensuring the development of trustworthy AI systems.
Read more»
Zero Trust & SOC 2 Compliance: The Significance of Robust Authentication
Organizations can achieve SOC 2 compliance more easily by opting for zero trust solutions, as they prioritize robust, continuous authentication.
Read more»
AI-Powered Identity Authentication
AI-Powered Identity Authentication Is Here: What You Need To Know
AI can provide more secure authentication by going beyond traditional boundaries & incorporating data context, biometrics, and patterns in user behavior.
Read more»
Cyber Risk Quantification
Understanding the Ins & Outs of Cyber Risk Quantification
In today’s digital world, cyber risk is high and growing. The best way to control this risk is with a proactive cyber security strategy that quantifies and measures your company’s vulnerability to theft, fraud, or data breach. The cyber threat landscape is diverse, and there is a wide range of potential threats in this sector,…
Read more»
How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more»
Strengthening IoT Security with Cloud-Native DHCP Listening
Enhanced IoT Fingerprinting & Security with Cloud-Native DHCP Listening More Like the Internet of Everything With the explosion of new devices connecting to the internet, IoT (or, the Internet of Things) really might as well be called IoE (or, the Internet of Everything.) The use cases for always-connected devices span across industries – from facilities…
Read more»
Why Log4Shell Remains a Major Risk for Corporate Networks.
Log4Shell is Still Lurking. What Does it Mean for Corporate Networks? What is Log4Shell & What Does it Affect? In December 2021, the Log4j vulnerability, also known as Log4Shell, was made public. Log4j is a logging utility for Java that allows developers to output log messages from their applications to various destinations, such as the…
Read more»
ztna shortcomings portnox
Why Do ZTNA Solutions Fall Short When It Comes to Zero Trust?
ZTNA & Zero Trust Zero Trust is a security architecture in which every individual, inside or outside the organization’s network, must be authenticated, authorized, and continually validated for data security configuration and posture before accessing or maintaining access to information and resources.   Zero Trust Network Access (ZTNA) is one of the ways of implementing Zero…
Read more»
network security architecture portnox
Why Integrated Network Security Architecture is the Future
Integrated network security architecture refers to a unified system of different network security features across a network. It provides a systematic approach to designing and implementing a set of cybersecurity measures that are synergistic and mutually supportive to one another, to provide an increased level of protection.   With an integrated network security architecture, you can…
Read more»
rogue api security portnox
Things to Consider When Defending Against a Rogue API
Application programming interfaces (APIs) are a crucial aspect of most businesses. Its responsibility involves the transfer of information between systems within an organization or to external companies. Unfortunately, a rogue API can expose sensitive data and the organization’s internal infrastructure to misuse.  A security breach could result in the leaking of sensitive customer data such…
Read more»
zero trust maturity model portnox
CISA’s New Zero Trust Maturity Model: What You Need To Know
Did you know that 74% of IT decision-makers now believe ransomware should be considered a matter of national security? Ransomware threats have skyrocketed in recent years. An eye-watering 60% of organizations fell victim to a ransomware attack last year. Undoubtedly, ransomware is cybersecurity’s most significant challenge today. So, how do organizations fight back and safeguard…
Read more»