Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Don't Delay Zero Trust
Don’t Delay Zero Trust! There’s Too Much at Stake.
In recent years, the concept of "Zero Trust" has gained significant traction as an effective security strategy for businesses looking to protect their assets and data. But despite the benefits of Zero Trust, many companies still delay its implementation, putting themselves at risk. We'll explore why companies shouldn't delay Zero Trust and the potential consequences of doing so.
Read more»
Cost of a data breach
The Real Cost of a Data Breach
Beyond the financial ramifications of a breach, it could compromise your reputation and the trust of your customers. In fact, according to Cybersecurity Ventures, 60% of small businesses go out of business within six months of a cyber attack. In addition to the financial losses, enterprises would have to contend with the cost of the following:
Read more»
Cyber Insurance
What You Need To Know About Cyber Insurance & Zero Trust
As enterprises attempt to navigate an ever-evolving security landscape, it can be challenging to protect everything. In addition, the recent uptick in cyberattacks has highlighted the need for multiple layers of security. Because of this concern, most large organizations have obtained cyber security insurance.
Read more»
Guest & Contractor Management
How to Implement Zero Trust with Limited Means
Today, organizations continue to struggle with how to implement zero trust. One of the greatest misnomers in cybersecurity is that zero trust is an expensive and complex set of products or tools businesses must attach to their network to protect themselves against the broadening threat landscape. However, Zero Trust is not physical. Rather, it is…
Read more»
network access control nac portnox
Implementing Zero Trust Requires Network Access Control (NAC)
Network Access Control (NAC) combined with zero trust can help organizations reduce their security risk and improve their security posture.
Read more»
zero trust edge portnox
How Zero Trust Strengthens the Software Supply Chain
The escalation of digital transformation since the beginning of the pandemic has forced us to rethink cybersecurity and the software supply chain. As the global supply chain becomes more interconnected and complex, organizations are increasingly turning to third-party software supply chain providers to streamline operations, reduce costs, and offer a full stack of solutions. However,…
Read more»
Zero Trust Security Takes Center Stage with NIH’s Identity-as-a-Service Solution
In today’s digital age, remote work has become the norm, even in research-based roles. With this shift, The National Institutes of Health (NIH) is seeking a modern, cloud-based solution to manage identity and access, which will support researchers as they work outside of NIH facilities. This move is also a response to the unique IT…
Read more»
Certificate Based WIFI Authentication Tile
Critical Infrastructure Under Attack: How Cyber Risks are Threatening Manufacturing & Industrial Sectors
Cybersecurity experts consider the May 2021 ransomware attack on Colonial Pipeline, which operates the largest fuel pipeline in the US, as the most significant cyberattack on critical infrastructure in US history. The attack resulted in a shutdown of all operations for almost a week, and the impact was felt nationwide as gas distribution was severely…
Read more»
Blazing New Trails In Keeping Your Network Safe
While 2022 was a banner year for Portnox, with several major releases that raised the bar for zero trust - expect more to come in 2023.
Read more»
Thunderdome: DISA’s Next Phase for Zero Trust
DISA's Thunderdome project aims to create a new cybersecurity and network architecture for the DoD's transition to zero trust.
Read more»
How the Zero Trust Security Model Is Evolving To Stop Cyber Threats
Zero trust has evolved to become a practically fail-proof security model – serving as a more effective, risk-based solution for stopping malicious threats.
Read more»
Zero Trust & SOC 2 Compliance: The Significance of Robust Authentication
Organizations can achieve SOC 2 compliance more easily by opting for zero trust solutions, as they prioritize robust, continuous authentication.
Read more»