Archives

Industroyer and Lessons for the Enterprise

June 22, 2017 |
Image of an electrical voltage box

Last week, security researchers from Dragos and ESET published their analyses of newly discovered malware, deployed to attack portions of the Ukrainian power grid in late 2016. This malware, dubbed “Industroyer” (also “CrashOverride”), was novel because the software was specifically... Read More

7 Benefits of a Software-Defined Perimeter

June 7, 2017 |
7 Benefits of a Software-Defined Perimeter

A Software-Defined Perimeter is a new network security model that dynamically creates 1:1 network connections between users and the data they access. It overcomes the limitations of traditional perimeter security such as VPNs, firewalls, and NACs and offers seven main... Read More