Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How CISOs Apply Zero Trust Thinking to Credential Harvesting Prevention

A customer opens their bank’s login page. At least, that’s what they think. The design is flawless, the fields are familiar. But it’s a cloned site built to harvest credentials. Within seconds, their details are replayed against the genuine portal. To the bank’s defenses, it looks like business as usual – same username, same password, same MFA prompt. This is the reality of credential harvesting, one of the most common precursors to account takeover.

Cato ZTNA: True Zero Trust Without Trade-Offs

Remote access is evolving – and legacy VPNs can’t adapt. In this video, see how Cato ZTNA delivers secure, scalable, and seamless access without the trade-offs of traditional VPNs or basic ZTNA tools. Discover how Cato provides: Universal ZTNA with one unified access policy everywhere Real-time Context Sharing for consistent enforcement across networking and security Zero Trust for Anyone, Anywhere, delivering secure access for all users and devices, including BYOD and contractors.

Powering Zero Trust Networking with Elastic and Gigamon AMI

The cybersecurity perimeter is gone. In its place, a far more resilient framework has emerged: Zero Trust Networking (ZTN). This security model assumes no transaction is automatically permitted. Every connection, request, and data flow must be verified continuously. Learn how Elastic and Gigamon Application Metadata Intelligence (AMI) enable a security posture built on constant verification, rapid response, and adaptive trust.

The MemcycoFM Show: Ep 15 - How CISOs Apply Zero Trust Thinking to Credential Harvesting Prevention

A customer opens their bank’s login page. At least, that’s what they think. The design is flawless, the fields are familiar. But it’s a cloned site built to harvest credentials. Within seconds, their details are replayed against the genuine portal. To the bank’s defenses, it looks like business as usual — same username, same password, same MFA prompt.

VPNs and Zero-Trust Architecture: How They Fit Together

The cybersecurity landscape has shifted dramatically in recent years. Remote work, cloud adoption, and increasingly complex digital ecosystems have expanded the attack surface for businesses. Traditional perimeter defenses no longer provide sufficient protection. In response, organizations are turning to two powerful tools: Virtual Private Networks (VPNs) and Zero-Trust Architecture (ZTA). Though distinct in purpose, they can complement one another in meaningful ways.

Choosing HIPAA-Compliance Platforms: Review of Emerging Tools

Healthcare software now carries the same weight as stethoscopes and exam rooms. It touches protected health information (PHI) all day, so HIPAA compliance can't be an afterthought. The challenge is sorting through a fast-moving market of tools that claim to be "secure" without showing how. This review walks through what to look for, highlights the most promising categories, and closes with a practical framework you can apply to any shortlist-plus a section on how CureMD helps physicians run faster, safer clinical operations.

Securing the Battleground: Moving Beyond Legacy Barriers to Zero Trust for IoT and OT IAM

Identity and Access Management (IAM) is rapidly emerging as the next battleground in industrial cybersecurity. As connectivity increases in operational technology (OT) and IoT environments, the complexity of securing machine and human identities grows. Legacy systems, cultural resistance, and the tension between uptime and security controls make IAM adoption a major challenge for operators.

Is Zero Trust a Total Bust? - The 443 Podcast - Episode 339

This week on the podcast, we discuss key findings from a DefCon presentation from researchers at AmberWolf titled ZeroTrust, Total Bust and what it means for Zero Trust Network Access. After that, we review a new vulnerability in the FortiWeb WAF before ending with a quick update from Google Project Zero on a new vulnerability disclosure policy. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.