Bridging the gap: Security & Compliance

Some CISOs fear auditors more than they fear actual hackers… Compliance has become a crucial focus with the implementation of regulations like the GDPR, CCPA, and various global data privacy directives. But whilst many organizations have rightfully turned their focus to said compliance, does it actually ensure better (cyber)security?

Two puzzle pieces demonstrate integration of VPN and firewalls.

VPN-Firewall Integration: A Strategic Analysis

Integrating various network functions within a single device, such as combining VPN (Virtual Private Network) capabilities with firewalls, has become a common practice over the past few years. This consolidation offers benefits in terms of platform security features (i.e. user-based policies and Layer 7 inspection), simplicity and cost-effectiveness.

Navigate the challenges of remote work

For enterprises large and small, remote access is no longer a luxury; it’s an imperative. The once-crystal-clear boundaries between “work” and “home” have blurred, creating a tapestry of workspaces as diverse as the people who populate them.

What happens when the ON2IT CSIRT jumps into action: A Customer Incident Playback

Prevention should be the holy grail of any cybersecurity strategy, but we know that 100% prevention is not realistic. So, what exactly happens when a serious threat is detected? Using a recent incident as an example, it is enlightening to follow the chain of events that starts when human SOC analysts decide that CSIRT action is required.

The Dynamic Update of Protect Surface Metadata

In our interconnected digital age, robust cybersecurity is as much about understanding what you’re defending as it is about the intricacies of the defenses themselves. Think of digital assets as a vast castle.