Category: featured

Providing Solutions

SolarMarker campaign used novel registry changes to establish persistence

Inserting custom file handling rules for a randomly-created file extension and a .LNK in Windows’ startup folder, malware installer created a stealthy persistence mechanism for backdoor.

Best practices to secure your Kubernetes workloads

Kubernetes’ growing status as a fixture of mainstream IT poses a challenge to traditional security approaches.

Three good reasons to take a SD-WAN approach

Software-defined wide area networks are an important part of your IT and cybersecurity landscape. Here’s how to take advantage of them.

Ransomware attacks drive ZTNA adoption

Organizations with recent direct experience of a ransomware attack have considerably higher adoption of zero trust network access (ZTNA) technology than those that haven’t fallen victim.