13 Essential Linux Security Commands
Basic Linux security commands that all IT security pros should know Linux, known for its power, flexibility, and security, is a staple in the world of operating systems. We love Linux, like a raccoon loves shiny things. Especially for personal projects. Why? Because Linux gives us control. It’s like having ... Read More
Kubernetes Security: Navigating the Cybersecurity Pitfalls
Nik Hewitt | | Best Practices, Cloud, Kubernetes Security, lateral movement, microsegmentation, next gen security, Security Research
By default, Kubernetes security lack controls, and any pod can talk freely to any other pod… Kubernetes has taken the tech industry by storm, earning justified accolades for its power in orchestrating clusters of virtual machines and scheduling containers to run on these machines. Its ability to automatically manage service ... Read More
How to Discover Your Internet-Facing Assets
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, security, Security Research, TrueFort, zero trust
Organizations need to uncover their internet-facing assets for application and data cybersecurity best practices Many organizations increasingly rely on internet-facing assets, such as web applications, cloud services, and remote access systems. The security of these assets is crucial, as vulnerabilities can expose businesses to cyberattacks and data breaches. Let’s examine ... Read More
Remote Access Cybersecurity: New CISA Best Practices
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, security, Security Research, zero trust
Key remote access cybersecurity takeaways from the new CISA guide to best practices Navigating the remote access cybersecurity landscape In today’s ever-connected working world, remote access software has become a lifeline for organizations. It’s the magic wand that IT support teams and Managed Service Providers (MSPs) use to troubleshoot IT ... Read More
AR and VR Cybersecurity Challenges: Navigating New Frontiers
Nik Hewitt | | application protection, Best Practices, device protection, microsegmentation, Security Research, zero trust
There are many unique VR cybersecurity challenges, and AR and VR are going mainstream Augmented Reality (AR) and Virtual Reality (VR) technologies are no longer just futurist fantasies. In light of yesterday’s news from Apple and Meta’s continued gaming support, VR is stepping up. Many of us in the tech ... Read More
Convincing Colleagues that Zero Trust Adoption is in Their Interest
Nik Hewitt | | advice, Best Practices, lateral movement, microsegmentation, Security Research, Uncategorized, zero trust
Zero trust adoption can be a stumbling block for our colleagues, but it doesn’t have to be that way We all know that, as cyber threats continue to evolve in sophistication and frequency, organizations must adapt and fortify their defensive strategies. A leading approach to cybersecurity, the zero trust model ... Read More
Locking Down BYOD Security Across the Enterprise
Nik Hewitt | | Best Practices, Cybersecurity, device protection, lateral movement, microsegmentation, security, Security Research, zero trust
Considering BYOD security best practices for safeguarding enterprise data In an age now defined by digital connectivity, the boundaries between personal and professional devices are becoming increasingly indistinct. More organizations are embracing the Bring Your Own Device (BYOD) trend, allowing employees to use their personal tablet devices, laptops, and smartphones ... Read More
Why is Cybersecurity Visibility so Important?
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, Security Research, zero trust
Clear visibility into your environment is critical to cybersecurity best practices Cybersecurity isn’t merely about building walls around your organization’s digital assets. It’s a complex game, where understanding the opponent’s moves and the playing field often dictates the outcome. When Sir Francis Bacon published his work, Meditationes Sacrae, in 1597, ... Read More
How IT/OT Cybersecurity Threats are Growing in Volume and Scope
Nik Hewitt | | Cybersecurity, device protection, iot, IT-OT, next gen security, Ransomware, Security Research
As we reach the middle of 2023, OT cybersecurity threats are getting more prevalent The manufacturing sector is fast becoming a hotbed for cyberattacks, with threat actors focusing their efforts on Operational Technology (OT) cybersecurity teams. According to the 2023 X-Force Threat Intelligence Index report by IBM, manufacturing is the ... Read More
The Fluid Landscape of Cybersecurity Insurance
Cybersecurity insurance products are transforming, pivoting from broad to specific coverages and with a deeper understanding of cyber risks With cyber threats escalating, insurance products designed to mitigate these risks are undergoing constant evolution. It’s no longer a simple game, but a dynamic match of chess where strategy, foresight, and ... Read More