The Endpoint Isolation Blog

Showing results for cybersecurity best practices

  • Mythbusting Network Security Architecture Best Practices

    By Yan Aksenfeld. June 25, 2020

    Given the cyberattack surface area presented by networks, it’s little surprise that network security professionals try to adhere to network security architecture best practices. A network must have security embedded in its very design. However, while best practices like network segmentation and device hardening are wise and worth pursuing, they are becoming increasingly deficient. This […]

  • Remote Access Security: Risks & Best Practices

    By Yuki Arbel. April 16, 2020

    Remote access has helped businesses function for decades. It makes it possible for mobile and dispersed workforces, including employees, contractors, partners, and vendors, to access corporate IT systems and data from anywhere, anytime.  The rise of telework — 52% of global workers are said to work from home at least once a week — has […]

  • How to Become a World-Class CISO

    By Mariel Sable. April 7, 2020

    What does it take to become a Chief Information Security Officer (CISO)? There are multiple answers, because it’s a multi-faceted role. Each person will bring a unique set of experiences to the job and there’s no clear-cut path or resume that defines the steps you must take to become a CISO. Yet, there are some […]

  • How to Secure DevOps Environments: Exploring Best Practices

    By Yuki Arbel. February 25, 2020

    Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to help organizations deliver better software faster. By using automation to manage many of the tasks of building, testing, […]

  • Implementing Privileged Access Workstations For Zero Trust Architecture

    By Tal Zamir. January 21, 2020

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as […]

  • Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

    By Tal Zamir. January 16, 2020

    Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network attacks. In the recommended configuration of Hysolate, Hysolate customers are not impacted by this vulnerability due to Hysolate’s secure-by-design […]

  • New Insights into Privileged Access Management (PAM) Best Practices

    By Jessica Stanford. January 15, 2020

    The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, tend to be the sort of digital “crown jewels” that are much sought-after by hackers. Best practices for Privileged Access Management (PAM), the […]

  • Taking Zero Trust Network Access to The Next Level

    By Tal Zamir. December 30, 2019

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile […]

  • Endpoints and Network Segmentation Best Practices

    By Yan Aksenfeld. December 23, 2019

    Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered among the “weakest links” in a cybersecurity strategy. They are thus the prime targets for network penetration attacks. That said, it’s apparent that […]

  • Page 1 of 2
  • 1
  • 2