Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Let’s be honest. Most people don’t trust zero trust. For users, when they hear the words ‘zero trust’, it sounds like it might take longer to log into work. And if you’re in IT or IT security, you may have more products to buy and integrate into your existing — already complicated — security stack. And of course, then there are the audits. Maybe that’s why so many zero trust projects are stalled. No matter…

Read More

Seamless Secure Work on a Plane

Seamless Secure Work on a Plane

Frequent travelers – this blog is for you. Let’s start off by walking through the experience of the remote worker that is always on the move. This traveler has the perfectly packed bag. They know exactly what time to show up at the airport to walk directly onto the plane. And their accumulated miles are a prized possession. However, one thing this frequent traveler can’t control is the work experience once they’re on that plane….

Read More

Helping Ivanti VPN Customers

Helping Ivanti VPN Customers

In January 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a directive (with an update in February) mandating that all U.S. Federal agencies take Ivanti systems offline for remediation. Over 1,700 Ivanti systems have been compromised; affected Ivanti VPN products are Ivanti Connect Secure (formerly Pulse Secure) and Ivanti Policy Secure gateways. The vulnerabilities include CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893. Cisco is helping customers move from Ivanti to Cisco Secure Access in order…

Read More

Mitigating Lateral Movement with Zero Trust Access

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their users, it’s worthwhile to analyze attacker techniques, as well as the protections and controls SSE solutions use to disrupt them. It’s useful to use the MITRE ATT&CK framework. MITRE ATT&CK is a large knowledgebase of attacker techniques that cybersecurity experts use to describe the attack kill chains…

Read More