Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

It’s Time to Stop Relying on Yesterday’s Cybersecurity Tools

Unfortunately, enabling WAFs to identify new zero-day threats doesn't go far enough to reliably protect web apps from threats.

Read More

Double Trouble for Cyberinsurers

Insurance companies are grappling with cybersecurity challenges both as potential targets, due to the attractive data they hold, and as providers of cyberinsurance, which scant actuarial data makes risky.

Read More

Why the Browser Continues to be the Top Threat Vector Exploited by Cyber Criminals

Actively defending your users' browsers, and not relying on them to recognize threats, using remote browser isolation is critical to protecting your network.

Read More

How Well Will Cyberinsurance Protect You When You Really Need It?

Faced with increasing numbers of attacks, cyberinsurers are writing more exclusions into policies and requiring more effective cyberdefenses.

Read More

RBI and Magic Quadrant Technology for Securing the Cloud

In the report, Gartner notes that Ericom ZTEdge Remote Browser Isolation is integrated with both Forcepoint’s and Netskope’s CASB solutions.

Read More

Securing HIPAA – Interoperability versus Data Protection

If proper security for EMR systems are not put in place, there is increase risk of cyberattack, personal data exposure, and costly HIPAA violations.

Read More

The Complex New Normal of Network Access

Corporate responses to COVID-19 related restrictions have accelerated many IT trends that had been taking shape over the past years.

Read More

Every Day is Game Day for Cybercrime

Sports teams depend on digital apps to run many business activities, but cyberattacks can result in lost revenue, reputational damage and legal risk.

Read More

mr. d0x Goes Phishing

Users are falling for new phishing attacks that are using fake sign-in forms, demonstrating (yet again) that enterprises must protect their users from phishing, instead of depending on users to protect themselves.

Read More