Blog

Providing Solutions

Best practices to secure your Kubernetes workloads

Kubernetes’ growing status as a fixture of mainstream IT poses a challenge to traditional security approaches.

Three good reasons to take a SD-WAN approach

Software-defined wide area networks are an important part of your IT and cybersecurity landscape. Here’s how to take advantage of them.

Ransomware attacks drive ZTNA adoption

Organizations with recent direct experience of a ransomware attack have considerably higher adoption of zero trust network access (ZTNA) technology than those that haven’t fallen victim.

Windows services lay the groundwork for a Midas ransomware attack

Attackers took two months to craft and install PowerShell scripts as services before deploying the ransomware