top of page

The Big Data Blog
Remediation from a Ransomware Attack; deploying Zero Trust from the top down
I was requested to provide guidance regarding a customer network that had recently experienced a Ransomware attack, specifically...
Jun 2, 20249 min read
8
0
The bridge too far... is network segmentation outdated?
Introduction: The SolarWinds attack of 2020 highlighted the urgent need for robust network security measures. While network segmentation...
Jun 2, 20243 min read
13
0
Minimizing Ransomware Attacks with Zero Trust Network Access
Introduction: Ransomware attacks have become a significant concern for organizations of all sizes and industries. These attacks can cause...
Jun 2, 20242 min read
7
0
Navigating the Digital Landscape: The Core Tenets of Zero Trust Network Access
In the ever-evolving landscape of cybersecurity, traditional security measures are no longer sufficient to protect sensitive data and...
Jun 2, 20243 min read
2
0
bottom of page