<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2092100&amp;fmt=gif">
    Browse by topic
    Subscribe to our news

    Zero Trust

    Zero Trust Security for Hybrid Kafka with CoIP Platform

    Apache Kafka is a popular open-source distributed streaming platform used to publish, subscribe, store and process streams of records, and is used to build real-time streaming data pipelines and applications.
    Read

    Zero Trust

    Zero Trust is a Journey

    There's been a recent groundswell of support for the Zero Trust movement, with NIST SP 800-207 formalizing the definition of a Zero Trust Architecture, and other agencies such as the NSA releasing guidance to promote the trend. Zero Trust has ...
    Read

    Microsegmentation

    Mastering Micro-Segmentation: North-South vs. East-West Strategies

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. North-South and East-West Micro-segmentation is one of the core functions of a next-generation Zero Trust cybersecurity solution, ...
    Read

    Zero Trust

    Zero Trust in Practice

    Never Trust... Always Verify... Now What? If you've been anywhere near cybersecurity in the last few months, you've probably heard the phrase "never trust, always verify" a few times – it's the core tenet of the Zero Trust movement. The concept ...
    Read

    Microsegmentation

    Micro-Segmentation Deployment Models

    The Three Basic Micro-Segmentation Zero Trust Deployment Models Micro-segmentation is a powerful strategy for reducing the cyber-risk associated with critical assets and resources. For an introduction to micro-segmentation, see our resource page, ...
    Read

    Insider

    5 Steps to Securing Work From Home with Zero Trust

    “Once upon a time, not everyone worked from home” might be the way our stories about life before COVID-19 start out fifteen years from now. While that might seem overly dramatic (and guaranteed to trigger eye rolls in teenagers), it’s no ...
    Read

    Insider

    The What and Why of Zentera Air

    We’ve just taken the wraps off Zentera Air Zero Trust Connectivity Services, a new SaaS offering that enables companies and teams to rapidly deploy and secure applications and services in complex hybrid environments. We’ve been working on this for ...
    Read

    Cybersecurity

    Another New Year, Another Cyberattack

    Happy New Year and yes, it happened again. The New Year’s Eve cyberattack on the London-based foreign exchange company Travelex took most of their services offline with the ransomware known as ‘Sodinokibi’. First discovered in April 2019, Sodinokibi ...
    Read

    Cybersecurity

    Are You Prepared for the Next WannaCry?

    Metasploit announced last month the availability of a BlueKeep exploit module that targets 64-bit versions of Windows 7 and Windows 2008 R2 through Windows Remote Desktop Services (RDP). While this is a net benefit for security practitioners, ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.