Get In Touch
This is Part 3 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Introduction In the first part of this blog series, we covered an overview of zero trust architecture concepts. The main concept is that trust should never be assumed based on where a user is in a network. The concept of a user or device being trusted because it is
The rise of credential stuffing attacks globally is made possible by the tendency of customers' re-using the same credentials across different websites and attackers' easy access to stolen credential lists.
This is Part 2 of a 5-part blog series. Jump to Part 1: Introduction Jump to Part 3: Software Defined Perimeter Introduction In the previous part of this blog series, we covered an overview of Zero Trust architecture concepts. The main concept is that trust should never be assumed based on where a user is in a network. The concept of a user or device being trusted because it is
Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, isn't a new phenomenon, but it is one that is having a growing impact, especially on financial services organizations. Our latest report takes a deeper look at
This introduction is Part 1 of a 5 part blog series. Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Introduction Most enterprises today operate hundreds of applications that support core business practices and were developed years ago with the same assumption in mind - that anyone inside the perimeter will get single sign-on access to any application or resource with legacy authentication schemes. The people
Like many other security professionals, you have been reviewing your security stack, reading up on the latest security trends, and have perhaps recently attended Info-Sec, RSA, Black Hat or some other relevant conference. Along the way, you may have seen messaging for recursive DNS (rDNS) as a security layer. However, it's hard for you to believe DNS is an effective security control, as you know it is a lookup service
By Chris Wraight and Charles Choe The U.S. back-to-school shopping period is a hectic time when parents are busy purchasing items for their children such as pencils, books, electronics and new clothes; back-to-college is just as important and is now tracked separately. According to the National Retail Foundation, the 2018 total back-to-school and back-to-college spending for K-12 schools and college is projected to reach a combined $82.8 billion (back-to-school $27.5b
Big promotional days like Black Friday and Cyber Monday that got their start in the U.S. are now major online shopping days for consumers around the world. Here are some tips for catering to global shoppers, and preparing for the surge of traffic to retail websites from all sources.
https://www.digitalcommerce360.com/2018/08/30/mobile-matters-how-to-ready-your-apps-for-the-holiday-shopping-spike/ While more consumers now shop on smartphones, retailers have a lot of work to do to make mobile shopping easy. Developers must account for the wide variety of mobile hardware and software, take into account how consumers use their phones in stores and ensure easy checkout.