Our Blog
Home / Blog
What is the Zero Trust security model, and why is its adoption growing?
Zero Trust promotes the concept that organizations should not trust any entity inside or outside their network perimeters in a predetermined fashion.Adoption of the Zero Trust security model is picking up steam at last. In February 2020 – before the pandemic swept the...
Vendor Workspace, Don’t Leave Home Without It
So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...
JSON Web Token attacks and vulnerabilities
JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...
Infographic: Securing Devices with MetaDefender Drive
The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home - and now back to the office - have created a wide range of cyber attack vectors through personal and unauthorized devices. Data...
Microsoft signed a malicious Netfilter rootkit
What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...