Operations | Monitoring | ITSM | DevOps | Cloud

Fashionably Late: The Zero Trust Trend is Here to Stay

I have often joked that IT, and in particular cybersecurity, is like fashion — not a lot is ever new, just reimagined and, in some cases, improved. As I sit pondering the beauty of my COVID-19 comb-over mullet, I have found myself thinking about how this fashion analogy applies to zero trust.

Wall Street Journal Predicts Dire Cybersecurity Days Ahead, Endorses Zero Trust

Let’s be honest for a second. This is a corporate blog. Yes, we aim to provide our readers with actionable, educational information. And, yes, we strive for complete transparency. But, at the end of the day, we understand if you’re skeptical of some of what’s written here. We’re a business, not a news publication, and it’s impossible for us to be completely unbiased all the time.

Silver Peak Zero Touch Configuration (ZTC) Demo

Teneo's Technical Customer Success Consultant, Gavin Mason-Sword provides a short demonstration on how to configure Silver Peak's Zero Touch Configuration (ZTC). The video demonstrates the ability to deploy sites with zero touch configuration using Silver Peak Orchestrator. ZTC enables the bulk staging of configuration for larger scale deployments. It allows for configuration cloning to reduce the risk of human error and also allows for ongoing configuration changes through a centralized, standard format. #TeneoGrp

Pipeline Ransomware. Could I Be Next?

If you have been following the news or trying to buy gas in Atlanta, you probably have already heard about the ransomware attack on one of the most important strategic pipelines in the US. 2020 saw ransomware attacks skyrocket and now 2021 seems to be following the trend. The current situation begs us to rethink how we think about our security practices and mindset. One area of security that you may have heard about is Zero Trust (ZT).

Barracuda CloudGen Access + Mattermost deliver Zero Trust security for messaging, devices, and access

Barracuda CloudGen Access, the new standard for Zero Trust remote access, and Mattermost, a messaging platform designed for enterprises with high privacy and security needs, have partnered to deliver the most rigorous remote access security for enterprise messaging. In this post we’ll look at how one next-generation investment service firm relies on the CloudGen Access and Mattermost solution to protect customer assets, personal information and corporate intellectual property.

Mobile Devices are Ubiquitous, and so are Cyberattacks

We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities. We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives.

Splunk and Zscaler Utilize Data and Zero Trust to Eradicate Threats

The past year has challenged us in unimaginable ways. We kept our distance for the greater good, while companies faced the daunting task of transforming their workforce from in-person to remote — practically overnight. This presented a unique challenge for cybersecurity teams. How would they ensure employees retained access to critical data in a secure way? Working in the cloud has made remote work easier for many organizations, but has also presented new risks.

Back Again: The Mobile Endpoint Is Now the Policy Enforcement Point in the Everywhere Workplace!

Several years back before the COVID-19 pandemic hit and the work-from-home shift took hold, we wrote a blog about how the mobile-centric zero trust framework removed the traditional perimeter security controls to protect the corporate enterprise network and all connected endpoints from cybercriminals.