All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local ac…

Read More >>

Why Zero Trust Needs the Edge

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or…

Read More >>

Defensive Security Podcast Episode 257

https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/
https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1
https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17…

Read More >>

Akamai Summarizes Service Disruption (RESOLVED)

At 15:45 UTC on July 22, 2021, a software configuration update triggered a bug in our Secure Edge Content Delivery Network impacting that network’s domain name service (DNS) system (the system that directs browsers to websites for that specific service…

Read More >>

Zero Trust Network Access Is an Oxymoron

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is tha…

Read More >>