The terms network segmentation and Zero Trust are used more and more, and have become proper buzzwords. We also see an increase in the number of requests ‘to segment the network’. What is actually meant, is if we can help setting up a Zero Trust environment.
By combining the Polar Flow data with social media profiles and other public information, Dutch journalists, together with the Bellingcat network for citizen journalism, were able to find names, addresses and photos of no less than 6460 individuals.
In a timespan of ten years, the IT-landscape has changed beyond recognition. Infrastructures that used to cost millions of dollars and took months of implementation are now available within minutes
Are you aware of the key players in the BAS-marketplace? Don’t feel too bad, because Breach and Attack Simulation (BAS) has only recently entered the mainstream in cybersecurity.
ON2IT announced that it will host managed services for Palo Alto Networks Cortex, the industry’s only open and integrated AI-based continuous security platform, starting with Cortex XDR.
Can your department tell the CEO within 30 minutes after detection of a breach how it happened, which data was impacted, how it was stopped and if all forensic evidence is safeguarded?