Browse by topic
    Subscribe to our news

    Cybersecurity

    Hardening Your DMZ Against AI-Powered and Autonomous Attacks

    For decades, the DMZ (demilitarized zone) has been treated as a reliable buffer between the internet and “trusted” internal systems. Expose a limited set of services, wrap them in firewalls, monitor traffic, and assume anything that makes it past ...
    Read

    News

    When 'Keeping Them Out' Fails: Rethinking Critical Infrastructure Security After Poland

    This blog was updated on January 28, 2026 to reflect new information reported on this attack. On December 29, 2024, almost exactly ten years after Russian hackers blacked out 250,000 Ukrainians in the first-ever cyberattack to take down a power ...
    Read

    Zero Trust

    Legacy Shadows: Illuminating Zero Trust Paths for Agencies in Brownfield Battles

    How federal agencies and their contractors can achieve Zero Trust for OT without disrupting mission-critical operations A control systems engineer is handed a mandate to achieve Target Level Zero Trust across an operational technology environment ...
    Read

    Zero Trust

    BRICKSTORM Is a Wake-Up Call: Stop What You're Doing and Protect Your DMZ

    On December 4th, CISA, the NSA, and Canadian Centre for Cyber Security dropped a joint advisory that should have every IT and security leader pulling up their network diagrams. The threat? BRICKSTORM, a sophisticated backdoor attributed to PRC ...
    Read

    Zero Trust

    Why Zero Trust Architecture Requires Cutting Through Complexity - Not Adding More of It

    The most dangerous moment in a Zero Trust journey isn't the kickoff. It's the moment 12–18 months in when leaders finally look at what they've built - and realize they've made everything more complicated, and nothing meaningfully more secure.
    Read

    Zero Trust

    Expanding Zero Trust to Critical Infrastructure

    In the November issue of Cyber Defense Magazine, Zentera CEO Dr. Jaushin Lee published a timely perspective on why traditional perimeter-centric controls no longer meet the realities of modern critical infrastructure risk. With permission from CDM, ...
    Read

    Zero Trust

    CMMC Compliance Accelerated: How Zero Trust Architecture Delivers Faster Results

    The Cybersecurity Maturity Model Certification (CMMC) has fundamentally changed the cybersecurity landscape for defense contractors. With CMMC Level 2 requirements being phased into DoD contracts starting in 2025, organizations can no longer rely on ...
    Read

    Zero Trust

    RBAC vs ABAC (and PBAC): How Access Control Models Evolved for the Zero Trust Era

    Access control has evolved from simple role assignments to dynamic, policy-driven systems. The ongoing debate of RBAC vs ABAC highlights how organizations are adapting to increasingly complex, distributed IT environments - and how PBAC extends these ...
    Read

    Cybersecurity

    Food Manufacturing Cybersecurity | Why Segmentation Is Critical

    A Wake-Up Call for Food Manufacturing Executives The ransomware attack hit without warning. Within hours, production lines at a major food distributor ground to a halt. Three weeks later, when systems finally came back online, the damage totaled ...
    Read

    Zero Trust

    Your Endpoint Tools Just Stopped Protecting Windows 10 - Now What?

    The Security Cliff: Windows 10 Support Is Ending — Gradually On October 14, 2025, Microsoft officially ended free support for Windows 10. While paid Extended Security Updates (ESU) will remain available through October 13, 2026, that program only ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.