A Successful Security Platform Requires the Strongest Partner Ecosystem

What’s in a name? When it comes to the term ‘security platform,’ quite a lot, going by its overuse in the industry. This moniker is increasingly being deployed in the marketplace to describe varying types of solutions. We maintain that in order for an offering to be called a security platform, it must meet the … Continue reading A Successful Security Platform Requires the Strongest Partner Ecosystem

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, IT teams need to not only mitigate known cyber breaches – but also need faster visibility and control when cybercriminals adapt their techniques. The recent threat of compromised software at SolarWinds is a … Continue reading Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE? My answer is almost always the same: Nothing….and, everything. Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but … Continue reading The difference between SASE and Zero Trust

The Rise of Telemetry Architecture

There was a time not so long ago when you were at a party and another party goer asked the question “Oh, and what do you do for a living?” Odds are, their answer might have simply been something like “I’m an architect” and from that you could infer that they designed and authored blueprints … Continue reading The Rise of Telemetry Architecture

Azure Functions Weakness Allows Privilege Escalation

A privilege-escalation vulnerability Microsoft’s Azure Functions cloud container feature could ultimately allow a user to escape the container, according to researchers. Intezer researchers dubbed the bug “Royal Flush” after a flush-to-disk limitation that an exploit would need to evade. Flushing to disk means that data is handed off to the kernel, where it’s visible to … Continue reading Azure Functions Weakness Allows Privilege Escalation