Waverley Labs Blog
Software-Defined Perimeters Also Outflanking DDoS Mitigation, Firewalls, and Incident Response Strategies
Recently there was a terrific article by Chris Preimesberger in eWEEK , Why Software-Defined Perimeters Outflank VPNs for Secure Remote Access, that examined the emergence of software-defined perimeters (SDP) as a more secure solution for VPNs. As a pioneer and...
read moreWill Software Defined Perimeter Debunk the Cyber Kill Chain? ….. part 2
This is the second in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...
read moreWill the Software Defined Perimeter Debunk the Cyber Kill Chain?
This is the first in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...
read moreThe Marriott Data Breach and the Cyber Kill Chain
In the latest stunning security breach, this one disclosed by Marriott, the personal data of 500 million customers has been compromised. Of even greater concern is the fact that the hackers had penetrated and moved freely within the hotel giants’ systems for nearly...
read moreInteroperability for Software Defined Perimeters is almost here!
Cisco was in the news recently when it announced the purchase of IAM company Duo Security for $2.3 billion. The move fortified Cisco’s ability to provide IAM and other security features to customers at a time when cloud and mobile computing have all but erased the...
read moreThe IoT and the Threat to Physical Security
Look beyond testing and compliance As the IoT and thousands of new IP devices grows exponentially, so do the security risks in variety of critical areas including physical security controls. An article in FCW recently outlined increasing risks posed by doors,...
read moreVoting and Election Security – Desperately Seeking the Security Savior
A recent NPR story outlined alarming election security issues on a variety of fronts. The story recounted individual security incidents impacting private companies specializing in products and services ranging from election systems and technologies to voting machines...
read moreEffective Election Security Requires MFA
Recently the Senate Select Committee on Intelligence released a set of recommendations to combat efforts by hostile states to interfere with U.S. elections. The committee' draft recommendations cover six areas and include guidance on deterrence, information sharing,...
read moreZero Trust, as defined by Forrester, does not provide complete security (Part 2)
In Part 1 last week, I made the case that Forrester’s concept of Zero Trust has key limitations and that only through the use of SDPs can Zero Trust be truly effective. Part 2 of 2 A software-defined perimeter (SDP) dynamically creates one-to-one connections between...
read moreZero Trust, as defined by Forrester, does not provide complete security (Part 1)
Part 1 of 2 In 2010, Forrester introduced the concept of the “The Zero Trust Network.” Essentially Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must...
read more