skip to Main Content

Monitoring of current Log4J attack vectors reveals that defense in depth provides effective mitigation as teams work to find, patch,…

Log4Shell Observations: Why Protecting Workloads with Native, Layered Defense Is Essential

In talking with end-user organizations, we’ve seen and heard lots of misconceptions and mistakes over the years – and even…

Top 10 Network Security Mistakes in AWS, and How to Fix Them

We’re Committing to Global Efforts Advocating for Cybersecurity and Online Safety during Cybersecurity Awareness Month October is Cybersecurity Awareness Month,…

Cybersecurity Awareness: Our Commitment to Security in the Cloud and Beyond

Sometimes the smallest of features makes a world of a difference. This post details the recent Amazon VPC routing enhancements…

Making East-West Security More Robust on AWS with More Specific Routing (MSR)

Ask an accomplished photographer, “what’s the best camera?” and the typical answer is, “the one you have with you.” For…

Cloud Network Security – Getting to Benefits With a Lot Less Cost

Our perspective on the latest Google Cloud announcement Last week, Google Cloud Platform and Palo Alto Networks announced a GCP IDS based…

Do You Care About Network Security in Public Cloud? You Certainly Should.

Back To Top