Last week I hosted a webinar on The Software Defined Perimeter: Creating an Invisible Infrastructure where I looked at the traditional perimeter model for security and whether or not it’s still a viable method of threat protection.
Categories for Network Security
Security risks to government come in many forms these days – it could be the person sitting in their basement seeking network access to break your security or another government. The reality is it doesn’t take a whole lot to... Read More
Restricting network access to only those applications or resources necessary for someone to do their job makes sense. It’s similar to restricting water from entering an entire hull so that the ship doesn’t sink. It’s easy, if you’ve ever been... Read More
“It is abundantly clear that, in many respects, a firm’s level of cyber security is only as good as the cyber security of its vendors,” stated Benjamin M Lawsky, the superintendent of financial services for New York State, in a... Read More
Author Chris Stoneff recently posted a great article on INFOSEC Institute: The Seven Steps of a Successful Cyber Attack. Stoneff makes some great points that I wanted to share as well as provide some additional insights and recommendations. Stoneff states,... Read More
Today we are pleased to announce that Cryptzone has closed a $15 million Series B round of funding. Led by Kayne Partners, with our existing investor Medina Capital and a number of its limited partners participating, the funding helps us... Read More
Cryptzone had the opportunity to speak with IT-Harvest’s Richard Stiennon for their 2015 RSA Video Series to talk cybersecurity. Stiennon sat down with Cryptzone’s CTO, Chris McNulty, and Product Manager, Jamie Bodley-Scott, to discuss this year’s breaches, the underlying causes... Read More