The Big News About Zero Trust

Zero Trust brings a new and highly innovative strategy to cyber defense practitioners. The term Zero Trust was first coined in 2009 by Forrester Research and has gained increasing acceptance and adoption across commercial enterprise and government. Forrester’s position was that the notion of treating the internal network as trusted and the external networks as […]

Disincentivizing Ransomware Attacks

Ransomware, malicious software designed to prevent access to resources until a ransom is paid, has grown in prominence over the past few years, and shows no signs of slowing down. Well-known ransomware examples include CryptoLocker, WannaCry, and SamSam, are all highly successful from an attacker’s point of view. These successes have further incentivized the perpetrators […]

Four Quick Questions with Cybersecurity Expert Ron Gula

We sat down with Ron Gula, the president of Gula Tech Adventures, to ask some pressing questions about cybersecurity. Ron is also the Co-founder of Tenable Network Security, a world leader in vulnerability management, Co-founder of Network Security Wizards, which produced the Dragon intrusion detection system, and is knowledgeable in many aspects of cyber security […]

New Integration from CryptoniteNXT and Palo Alto Networks provides best-in-class security to secure IOT and shut down advanced threats.

We’re pleased to share our new integration with Palo Alto Networks. Together, we’re harnessing the power of CryptoniteNXT and the Palo Alto Networks Next-Generation Firewall (NGFW) to stop endpoint reconnaissance directed into the network that might compromise unprotected Internet of Things (IoT) devices. Attackers are using increasingly sophisticated techniques to penetrate the best-defended network architectures. […]