We’ve Raised Series B!!!
by John Dasher | Mar 22, 2022
What use cases can be solved by zero trust network access?By John Dasher
“Zero Trust” is a cybersecurity framework and philosophy that assumes no user, device, or network can be inherently trusted. Instead, it requires the verification of every user and device attempting to access resources on a network, regardless of their location, whether they are inside or outside the organization’s perimeter. Zero Trust Network Access (or ZTNA) […]
SWG versus CASB: What’s the Difference?By Carrie Landry
It’s pronounced “swig” and it’s definitely a cybersecurity cocktail: secure web gateways are a mix of tools specifically designed to protect users and their devices while browsing the internet. If you ask Gartner, a secure web gateway must contain: URL filtering, malicious code detection and filtering, and application control for cloud apps like Microsoft 365. […]
Life after LastPassBy Ashur Kanoon
Last year in 2022, there were 1,802 data compromises affecting more than 422 million people – but the LastPass data breach is the one that has security practitioners chatting. The original incident happened in August of 2022. Initially, we were told it was a “minor” breach…yet the story continues to evolve even at the time […]