Best of both worlds: automated cloud access management and incident response

Cloud adoption has done a lot of good for businesses in driving innovation, agility, and scale. But as organizations adopt cloud services into their IT infrastructure, their security teams are...

Read More

5 mistakes CISOs must avoid in 2019

It’s that time of year again when you’re expected to review the past year and refine your resource protection strategies to avoid a data breach. The stakes are high. There is almost nothing more...

Read More

Zero Trust is the InfoSec trend of 2018: here’s why

The use of cloud applications and cloud-based storage have become so popular that organizations are being compelled to re-define and update their security and access strategy to protect their...

Read More

Zero Day protection of SSH Servers with Zero Trust Access

On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh.


The vulnerability originated from a specific...

Read More

Cisco and Luminate partner to provide Zero Trust Access model

Modern enterprise IT and Security teams aim to provide and govern user access to corporate assets deployed in hybrid, dynamically changing environments. The dynamic nature of the modern IT...

Read More

A new approach to enterprise cybersecurity: Zero Trust access delivered as a service

When thinking about the next step in network security, we should all take inspiration from Google’s perimeter-less BeyondCorp initiative, where ad-hoc permissions are granted, based on individual...

Read More