Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Multi-Cloud Security
The Challenges of Multi-Cloud Security
At its core, multi-cloud involves using cloud services from more than one cloud vendor. It can be as simple as using software-as-a-service (SaaS) solutions like Salesforce, Office 365, or Dropbox from different cloud vendors. However, in the enterprise, multi-cloud typically refers to the strategic use of multiple cloud providers for running critical applications and workloads. Here, cloud services tend to fall into more specific and technical use cases like platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), function-as-a-service (FaaS), and container-as-a-service (CaaS).
Read more»
IoT in agriculture
IoT in Agriculture: Secure Smart Farming
The age of smart farming is here, and IoT is a major driving force behind this change. IoT in agriculture can optimize crop yields, reduce waste, improve animal health, and more. With this in mind, let's explore what IoT in agriculture is, its various use cases, and, most importantly, how we can ensure the security of IoT devices and data in this critical industry.
Read more»
Automotive IoT
Automotive IoT: Use Cases & Security
The global automotive IoT market size was valued at USD 82.7 billion in 2021 but is projected to surpass around USD 621.8 billion by 2030. In other words, IoT is massively disrupting the automotive sector, and this trend will persist as automakers look for innovative ways to set themselves apart in a fiercely competitive market. Connected cars, telematics, fleet management, and autonomous vehicles are just a few examples of how IoT is revolutionizing how we drive and maintain vehicles.
Read more»
IoT and 5G
5G and IoT: Opportunities, Challenges, & the Road Ahead
The convergence of 5G technology and the Internet of Things (IoT) is poised to reshape the digital landscape, offering unprecedented opportunities for businesses and consumers alike. As 5G networks roll out, they will provide the necessary infrastructure for IoT devices to communicate faster and more efficiently, enabling a new era of connectivity and innovation. Moreover, the integration of 5G technology is expected to boost the development of industry 4.0, revolutionizing manufacturing processes and supply chain management through increased automation and data exchange. 
Read more»
school cyber attacks portnox
U.S. School Cyber Attacks Are On the Rise. It’s Time to Fight Back.
In recent years, U.S. school districts have increasingly become targets for cyber attacks. These school cyber attacks have ranged from ransomware attacks to data breaches, resulting in a significant loss of data and resources for school districts. The reasons for this are varied, but a common issue is the lack of proper network access controls…
Read more»
Guest & Contractor Management
How to Implement Zero Trust with Limited Means
Today, organizations continue to struggle with how to implement zero trust. One of the greatest misnomers in cybersecurity is that zero trust is an expensive and complex set of products or tools businesses must attach to their network to protect themselves against the broadening threat landscape. However, Zero Trust is not physical. Rather, it is…
Read more»
tiktok security portnox
TikTok Security Concerns in the Workplace
TikTok, the viral social media app centered around short videos and owned by the Chinese company ByteDance, is coming under intense scrutiny. By now, many of us have seen a TikTok video filmed in someone’s workplace—those “day in the life” clips or rants about coworkers, supervisors, or customers. Or you may have seen a video…
Read more»
Using Your Own Tools Against You: The Rise of Living-Off-the-Land (LOTL) Attacks
While some cyber-attacks announce their presence like a blaring siren, others fly quietly under the radar. This presents a significant challenge for network security teams, who are already battling increasingly frequent, sophisticated, and severe attacks. One cunning technique that has gained considerable traction in recent years is Living-Off-The-Land (LOTL) attacks. Here, threat actors use an…
Read more»
Why Enterprises Must Implement a Third-Party Data Risk Management Strategy
What’s the very last thing a business wants to tell its customers? Without a doubt, it’s that their data may have been compromised due to a third-party vendor data breach. Today’s cyber landscape is more complex, riskier, and costlier than ever. Most cybersecurity experts and professionals know a majority of cyber breaches are the result…
Read more»
NIST Releases New AI Risk Framework to Combat Emerging Threats from Malicious AI
NIST's AI Risk Management Framework aims to mitigate threats from malicious AI while ensuring the development of trustworthy AI systems.
Read more»
AI-Powered Identity Authentication
AI-Powered Identity Authentication Is Here: What You Need To Know
AI can provide more secure authentication by going beyond traditional boundaries & incorporating data context, biometrics, and patterns in user behavior.
Read more»
Cyber Risk Quantification
Understanding the Ins & Outs of Cyber Risk Quantification
In today’s digital world, cyber risk is high and growing. The best way to control this risk is with a proactive cyber security strategy that quantifies and measures your company’s vulnerability to theft, fraud, or data breach. The cyber threat landscape is diverse, and there is a wide range of potential threats in this sector,…
Read more»