In Cybersecurity, Choosing to Stay Is the Signal
Long-tenured cybersecurity experts matter. ON2IT celebrates teammates who choose to stay and strengthen our Zero Trust SOC with experience, trust and continuity.
Long-tenured cybersecurity experts matter. ON2IT celebrates teammates who choose to stay and strengthen our Zero Trust SOC with experience, trust and continuity.
This is a hands‑on guide on what to do now – and when to add extended detection and response (XDR).
We challenge you to look at cybersecurity assessments through a different lens. IT and executive leaders alike should recognize assessments for the sanity check they are, as well as a way to build trust within the organization. Not as some sort of score card or grading system, but as a way to figure out where to start and where to go next.Â
Even if you’re an IT professional feeling a bit skeptical about the board’s intentions, you can still see that their involvement is a great chance to align security measures with the company’s broader goals. It’s all about framing this as a partnership, not a critique. One of the best ways to do that is through a cybersecurity assessment that actually makes sense.
Though Zero Trust is here to stay, that doesn’t mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this second part of his blog series he answers the question: what part does business alignment play in cybersecurity implementations?
Palo Alto Networks published vulnerability CVE-2024-3400 that allows unauthenticated command injection (RCE) in the GlobalProtect feature of Palo Alto Networks PAN-OS software. Specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.