by Juanita Koilpillai | Apr 27, 2020 | Blog Posts
Zero Trust is a strategy. Software Defined Perimeter based on mTLS makes it a true solution Earlier this month there was another high visibility hack that involved malicious hijacking of more than 8,800 internet traffic routes from 200+ networks, and included the...
by Juanita Koilpillai | Apr 1, 2020 | Blog Posts
Agile ATO in the Spotlight The industry is grappling with conflicting network connection paradigms as the proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Authentication of users...
by Juanita Koilpillai | Mar 17, 2020 | Blog Posts
Significant and rapid increases in global IP traffic and the adoption of mobile devices have challenged network service providers to scale and improve infrastructure. To address this network providers are beginning to embrace new approaches such as Network Function...
by Juanita Koilpillai | Feb 27, 2020 | Blog Posts
Nearly two years ago, Federal agencies began embracing a shift to agile development methodologies—releasing projects in stages to get user feedback and rectify bugs early in the process and continuing to iterate and improve over time. A key challenge however was the...
by Juanita Koilpillai | Jan 24, 2020 | Blog Posts
Zero Trust does not equate to Zero Risk As part of its work on the Defense Department’s Enterprise DevSecOps Initiative, the Air Force is increasingly deploying solutions like Kubernetes, the open-source platform for managing containerized workloads and...
by Juanita Koilpillai | Jan 9, 2020 | Blog Posts
Software-defined perimeter (the most advanced zero trust implementation) shows promise. Kubertnetes, Red Hat OpenShift, are you listening? DevOps teams continue to increase use of virtualization – be it virtualizing[1] operating systems or containerizing[2]...
by Juanita Koilpillai | Nov 22, 2019 | Blog Posts
Zero Trust is a catchphrase that is growing in use and is employed by cyber security product and service vendors to promote their offerings. Zero Trust, as the concept implies, requires that users aren’t allowed any access to anything until they can prove who they...
by Juanita Koilpillai | Nov 13, 2019 | Blog Posts
Software Defined Perimeter’s deny-all approach protects IoT devices In 2016, a massive distributed denial of service (DDoS) attack left much of the internet inaccessible on the U.S. east coast. The attack, which authorities initially feared was the work of a hostile...
by Juanita Koilpillai | Nov 1, 2019 | Blog Posts
New research confirms effectiveness and importance Yet another distributed denial of service (DDoS) attack has been reported and this time was sustained for a full day. AWS’s mitigations not only absorbed the vast majority of attacks but also flagged...
by Juanita Koilpillai | Oct 9, 2019 | Blog Posts
In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customer accounts and credit card applications affecting 100 million people in the U.S. and 6 million people in Canada. According to Capital One, the breach was...
by Juanita Koilpillai | Sep 25, 2019 | Blog Posts
Software Defined Perimeter architecture mandatory to ensure truly secure environments TechTarget recently published a four-part E-Handbook: Can a zero trust approach fill the security perimeter void? The four article series outlines Forrester’s vision for Zero Trust...
by Juanita Koilpillai | Sep 18, 2019 | Blog Posts
Introducing the Dynamic AccessIDTM Network & Toolkit Zero Trust is a catchphrase that is growing in use and is employed by cybersecurity product and service vendors to promote their offerings. Zero Trust, as the concept implies, requires that users aren’t allowed...
by Juanita Koilpillai | Aug 26, 2019 | Blog Posts
Databank, a leading provider of enterprise-class data center, cloud, and connectivity services, recently published a blog How to Make Continuous Monitoring Part of Your Compliance and Security Strategy. It outlines how continuous controls monitoring (CCM) is a...
by Juanita Koilpillai | Aug 8, 2019 | Blog Posts
SDP training course in the works The CSA recently completed its first annual “State of Software-Defined Perimeter” Survey gauging market awareness and adoption of this modern security architecture – summarized in this infographic. The survey indicates it is still...
by Juanita Koilpillai | Jul 22, 2019 | Blog Posts
*** Written exclusively for Waverley Labs by Lilith Croswell In this day and age, cybersecurity is no longer a concern limited to financial institutions and tech companies. Smaller entities like startup firms and small-scale businesses are also at great risk. Cyber...