The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.
What Businesses (by size) were Targets of Ransomware Q1 2021?
Midsize enterprises (MSEs) are the preferred target for ransomware attacks. How are C-level execs are actively responding and what are their options?
Read More9 Best Practices Depend on Identity and Access Management
Strong Identity and Access Management (IAM) needs to be at the core of any organization’s cyber-defenses. These 9 security best practices depend on it.
Read MoreSASE Architecture: The Evolution of Network Security
One emerging solution architecture that has gained traction to help secure modern distributed organizations is called Secure Access Service Edge (SASE).
Read MoreClose the Security-Usability Gap with the Right RBI Solution
This article covers how first generation RBI solutions can't compare with ZTEdge Web Isolation, a proven next-generation Zero Trust solution developed for today's, and tomorrow's, challenges..
Read MoreColonial Pipeline and VPN Vulnerabilities
According to a Bloomberg report, the attack on Colonial Pipeline can be traced to the company's insufficient diligence in following a number of IT best practices related to its remote access solutions.
Read MoreMSSPs – Win in the SASE Midsize Enterprise Market with ZTEdge
Midsize enterprises, and the MSSPs that serve them, are typically an afterthought for big enterprise security vendors. Enter ZTEdge - the right solution at half the cost.
Read MoreMachine Learning in Identity and Access Management
Take a closer look at how machine learning, a subfield of artificial intelligence, is being deployed in cybersecurity for identity and access management security controls.
Read MoreWhy Remote Browser Isolation (RBI), Why Now?
Remote browser isolation (RBI) has evolved from a "fringe" technology with rough edges that affected performance and user experience to a new class of RBI product that is ready for prime time.
Read MoreMidsize Enterprises Migrate to Cloud-Based Zero Trust Solutions
Adopting a cloud-based Zero Trust security approach is the best way for midsize enterprises to defend their distributed workforces against today’s cyber threats.
Read More