Quantcast
Channel: Etay Maor
Browsing latest articles
Browse All 28 View Live

Are Security Appliances fit for Purpose in a Decentralized Workplace?

Security appliances are amongst the most riskiest enterprise devices and are a often method for threat actors to infiltrate a business. The post Are Security Appliances fit for Purpose in a...

View Article


In the Context of Cloud, Security and Mobility, It’s Time Organizations Ditch...

If organizations understand the benefits SASE offers over MPLS and traditional SD-WAN, they will realize that SASE is poised to replace aging MPLS in due time. The post In the Context of Cloud,...

View Article

Is XDR Enough? The Hidden Gaps in Your Security Net

When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times. The post Is XDR Enough? The Hidden Gaps in Your Security Net appeared...

View Article

The OODA Loop: The Military Model That Speeds Up Cybersecurity Response

The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threat hunting. The post The OODA Loop: The Military...

View Article

SD-WAN: Don’t Build a Dead End, Prepare for Future-Proof Secure Networking

SD-WAN must be scalable, stable, secure, and fully operational to serve as a strong base for seamless modernization and progression to SASE.  The post SD-WAN: Don’t Build a Dead End, Prepare for...

View Article


8 Degrees of Secure Access Service Edge      

Assembling a diverse team, outlining clear objectives, and meticulously assessing your network landscape can enable organizations to successfully navigate SASE migration without hiccups and pitfalls....

View Article

Article 1

View Article

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA...

With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make malicious traffic appear as trusted cloud traffic. The post Cloudy...

View Article


Reframing the ZTNA vs. SASE Debate

While ZTNA can be deployed independently, it is an integral component of the SASE architecture as well. The post Reframing the ZTNA vs. SASE Debate appeared first on SecurityWeek.

View Article


Evasion Tactics Used By Cybercriminals To Fly Under The Radar

Relentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics Used By Cybercriminals To Fly Under The Radar...

View Article

AI Models in Cybersecurity: From Misuse to AbuseIndustry Moves for the week...

In a constant game of whack-a-mole, both defenders and attackers are harnessing AI to tip the balance of power in their respective favor. The post AI Models in Cybersecurity: From Misuse to Abuse...

View Article
Browsing latest articles
Browse All 28 View Live