Blog

Featured Posts

What Is Zero Trust Architecture?
Sunil Muralidhar
October 1, 2020

What Is Zero Trust Architecture?

Read Post
4 Top Benefits of Application Whitelisting
Jai Balasubramaniyan
September 26, 2020

4 Top Benefits of Application Whitelisting

Read Post
Key Tenets of Zero Trust Architecture
Satyam Tyagi
September 4, 2020

Key Tenets of Zero Trust Architecture

Read Post

Recent Posts

What Are Advanced Persistent Threats (APT) and How Do You Contain Them?

Announcing General Availability of ColorTokens Unified Security Platform – Proactive Security for Hybrid Data Centers and Clouds

4 Steps to Simplify Your Cybersecurity Journey

Five Reasons Why ATMs Can’t Be Protected with Antivirus Anymore

Zero Trust to Protect Banks from Cybersecurity Fraud

Castles Don’t Scale. Neither Does Your Perimeter Security Solution!

Best Practices to Secure Multi-Tenant Environments

The Need for Zero Trust Security

Omni-Security for Retail

Is your data center equipped to thwart mutated malware strains?

How environment separation improves data security [Part 2]

Micro-Segmentation for Data Centers: How It Works

How environment separation improves data security [Part 1]

Advanced Threat Protection: Micro-Segmentation Scores Over Firewalls

1 3 4 5 6