Blog
DDoS Attacks Can Now be Stopped Dead in Their Botnet Tracks
Software Defined Perimeter’s deny-all approach protects IoT devices In 2016, a massive distributed denial of service (DDoS) attack left much of the internet inaccessible on the U.S. east coast. The attack, which authorities initially feared was the work of a hostile...
SDP Provides Resiliency Against Denial of Service Attacks
New research confirms effectiveness and importance Yet another DDoS attack has been reported and this time sustained for a full day. AWS’s mitigations not only absorbed the vast majority of attacks but also flagged legitimate customer queries. Mitigations...
Software Defined Perimeter (SDP): Creating a new network perimeter
By Matt Conran, Contributor, Network World June 12, 2019 See original article Considering the way networks work today and the change in traffic patterns; both internal and to the cloud, this limits the effect of the fixed perimeter. Networks were initially designed to...
Software Defined Perimeters Ready for Public Cloud and Service Provider Prime Time!
Linda Musthaler, a principal analyst with Essential Solutions Corp, recently posted a terrific article in Network World about the increasing ability of Software-Defined Perimeters (SDP) to bring trusted access to critical applications in public, private and...
Will the Software Defined Perimeter Debunk the Cyber Kill Chain? Part 4 – final
This is the fourth and last in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...
Will Software Defined Perimeter Debunk the Cyber Kill Chain? Part 3
This is the third in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on “Delivery,...
Will Software Defined Perimeter Debunk the Cyber Kill Chain? ….. part 2
This is the second in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...
Will the Software Defined Perimeter Debunk the Cyber Kill Chain?
This is the first in a series of blogs that examine how Software Defined Perimeters (SDPs) can significantly improve security and reduce risk associated with the Cyber Kill Chain (or seven phases of attack). This week we will look at the impact of an SDP on...
The Marriott Data Breach and the Cyber Kill Chain
In the latest stunning security breach, this one disclosed by Marriott, the personal data of 500 million customers has been compromised. Of even greater concern is the fact that the hackers had penetrated and moved freely within the hotel giants’ systems for nearly...
Interoperability for Software Defined Perimeters is almost here!
Cisco was in the news recently when it announced the purchase of IAM company Duo Security for $2.3 billion. The move fortified Cisco’s ability to provide IAM and other security features to customers at a time when cloud and mobile computing have all but erased the...
Recent Comments