Making the Case for Network Segmentation in AWS

Network segmentation is a concept that dates back to the start of enterprise IT systems. The simplest demonstration of this is separating application and infrastructure components with a firewall. This concept is now a routine part of building data centers and application architectures. In fact, it’s nearly impossible to find…

Read More

How to Know if Your Cybersecurity Tools Are Actually Working

Your organization has invested in dozens of cybersecurity tools. But you’re not sure if they’re working as expected. For example, what percentage of successfully blocked attacks reported by your security information and event management (SIEM) tool are false reports, where the attack actually occurred but was reported as blocked? Zero…

Read More

What Is Conditional Access, and Why Does It Matter to You?

Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted on the condition that, at a minimum, users enter a username and password? True enough. But the term “conditional access”…

Read More