Why Zero Trust reflects today’s challenges

Since Covd-19 started, I probably talked more about Zero Trust than ever before. Not that the concept is new, but the pressure to apply it, suddenly increased dramatically with all the users sitting at home and not within the “well-protected” network perimeter. There were different challenges companies faced these times but two came up repeatedly:…

Details

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There is another fairly current article mentioning that, even when it comes to industrial espionage in the times of COVID-19: State-linked hacking continues amid…

Details

Threat Intelligence on COVID-19

The question what the malicious actors do during the crisis is one which comes up fairly often. My observation was – as bad as it sounds – that we had “business as usual”. As with any catastrophe or significant event, we see themed phishing attacks popping up – the same here. I guess as long…

Details

Webinar: Securing Remote Work

This week we will run a webinar as a follow up to a blog post: the Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios These webinars will take place: Session 1: Tuesday, March 31, 2020  9:00 AM Pacific Time Session 2:Tuesday, March 31, 2020  6:00…

Details

Secure Working from Home – Some Ideas and Guidance

There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile a few resources, which might help you overcome some of the current challenges: VPN Shortage Quite some customers initially decided to route their…

Details