Posts

Showing posts from September, 2022

Seven Key Considerations for a ZTNA Solution

  For a long time, the majority of companies depended heavily on Virtual Private Networks (VPNs) and security techniques based on premises to secured remote access. Since 2020, the weaknesses of these strategies have become clear: They aren't able to scale easily. IT is not able to see the activities of users and their activity Performance is affected when traffic is backhauling into the security stack within the data center. It's not feasible to set up and maintain VPN clients for BYOD as well as partner devices They're difficult to integrate in cloud environments. They are not equipped with privileges Access Management (PAM) capabilities for engineering and DevOps users. Secure Access using Zero Security This is why  Zero Trust Network Access (ZTNA)  is becoming the most important element in a standard security architecture. The ZTNA design "never trusts and always verifies." When it is in place, ...

Forecasting Metaverse Threats: Will it Become Metaworse?

  The current metaverse concept is made up of many distinct and interconnected virtual spaces.   Therefore, it's impossible for one company to create the whole metaverse on its own.   One estimate that is optimistic is that the metaverse as a whole is between five and 10 years away from its fully operational.   However, over the coming 3 to 5 years we can expect to be flooded with more applications that are similar to the metaverse.   Certain, like Decentraland or Crypto Voxels, as well as games such as Minecraft or Second Life, already exist. The current metaverse-like applications are made specifically for gamers, not the general public.   In the near future we can expect daily activities like remote work entertainment as well as education and shopping will be performed in the next generation of metaverse-like apps.   A majority of these applications will be able to share cyberspace and will evolve to a single, unified metaverse as the te...

Five Black Hat 2022 Takeaways (and One Bonus!)

  The range and depth of conversations with the most important people in the industry shed illumination on today's most pressing issues. I selected the five most significant ones: 1.   The market is constantly trying to find a way to validate It seems like the understanding of the advantages of automating attack simulations that validate the security control's effectiveness is growing. The importance of traditional BAS (Breach and Security Simulation) solutions for fine-tuning security control settings and maximize effectiveness is much better understood in the present.   This has led to deeper inquiries about the possibility of running scenarios from end-to-end which simulate an attacker attempting various strategies to get around barriers. However, even though the importance of traditional BAS is more widely accepted in the present than it was before, as this category has seen a surge in acceptance in the past year and organizations are aware that the scope to...