Blog

Featured Posts

What Is Zero Trust Architecture?
Sunil Muralidhar
October 1, 2020

What Is Zero Trust Architecture?

Read Post
4 Top Benefits of Application Whitelisting
Jai Balasubramaniyan
September 26, 2020

4 Top Benefits of Application Whitelisting

Read Post
Key Tenets of Zero Trust Architecture
Satyam Tyagi
September 4, 2020

Key Tenets of Zero Trust Architecture

Read Post

Recent Posts

History of PCI-DSS: The Path to 4.0

Approaches to Micro-Segmentation: Pros and Cons

Micro-Segmentation: The Answer to the Vanishing Perimeter

Simplifying PCI-DSS Compliance with Micro-Segmentation

ColorTokens: Bringing A Paradigm Shift In Cybersecurity

ColorTokens Honored With 5 Awards at the 2020 Cybersecurity Excellence Awards

Why Visibility is Essential for Micro-Segmentation Success

11 Policy Engine Essentials for Micro-Segmentation

RSA Conference 2020: 4 Tips for a Successful Event

2019 Data Breaches – Top Reasons and Best Practices That Could Have Prevented Them

United Nations Cyberattack Compromises 42 Core Servers

Best Practices for a Successful Micro-Segmentation Journey

Windows 7 End of Life: Protecting Legacy Systems from Cyberattacks

Hackers Strike Travelex with a $6 Million Ransomware Attack

Data Breach Cost in India Rises by 8% in 2 Years to $1.6 Million

Protect Healthcare Systems with a New Generation of Cybersecurity

1 2 3 4 6