One of the most buzzworthy terms in cybersecurity right now is the high-concept, somewhat cryptic construct called zero trust. In a nutshell, it’s designed to strengthen and tighten cybersecurity ...
Micro-segmentation is regarded as one of the most effective methods to reduce attack surfaces, and a lack of it has often been cited as a contributing factor in some of the largest data breaches.
Four out of five cybersecurity leaders now use micro-segmentation to protect corporate networks, according to a new study by cybersecurity company Byos. Micro-segmentation is the creation of zones in ...
In the realm of cybersecurity, guidance from authoritative bodies like the National Security Agency (NSA) often carries significant weight. However, recent articulations around zero-trust principles ...
HALIFAX, Nova Scotia--(BUSINESS WIRE)--Today Byos, Inc. introduced the Byos™ μGateway™ (“micro-gateway”), the first plug-and-play security product that protects endpoints from threats on local Wi-Fi ...
Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the ...
This article originally appeared in the April 2020 issue of Security Business magazine. When sharing, don’t forget to mention @SecBusinessMag! Network segmentation is the security integrator’s first ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results