Categories for Endpoint Security

AWS and the Quest for Identity-Centric Security

September 13, 2016 |
Control user access to AWS resources, in a very fine-grained way, without having to manually create and maintain burdensome lists of IP addresses across security groups

Everyone using Amazon Web Services (AWS) quickly becomes familiar with the Shared Responsibility model for security, depicted below. This is a necessary, and well-thought-out part of the AWS design, clearly delineating what customers and AWS are responsible for from a... Read More

What is a Software-Defined Perimeter?

June 13, 2016 |
Definition - what is a Software-Defined Perimeter

Many recent headlines have highlighted the fact that the traditional perimeter-based approach to network security has failed to adequately protect organizations, and that a new approach is needed. Traditional security tools like VPNs, firewalls, and NACs are labor-intensive to manage,... Read More

The Twelve Days of Cyber Plunder

December 9, 2015 |
Bad Santa

As the holiday season approaches, we caution you to take heed of the cyber perils in this familiar holiday tune. While we had a little fun with the verse, this cautionary tale unfortunately rings true for many.     On... Read More

Should You Worry About State-Sponsored Cybercrime?

August 27, 2015 |
Cyberattacks ahead

If there’s one thing recent cyberattacks on compromised government personnel data should have taught us, it’s that state-sponsored cybercrime is far more than just a bogeyman story made up to frighten IT professionals. One recent example is where Chinese hackers... Read More