Zero Trust. Everyone’s talking about it, but what does it truly mean, and how can you prove that your organization is using a Zero Trust model effectively? Where did Zero Trust come from? For the security veterans among us, we remember the old network security...
TL;DR: Given recent news about misconfigured Kubernetes clusters, it’s a great time to review best practices for ensuring the security configurations for your own Kubernetes network. Read on to learn more. Researchers recently discovered some 900,000 Kubernetes...
NodeZero is a generational leap beyond a traditional pentest – organizations often see that for themselves from the moment they give our autonomous pentesting platform a shot. NodeZero surfaces risks and weaknesses that would never have come up during a general...
A new privacy study has found that 60% of states are moving toward new data privacy laws. Despite the push, implementation at the state level is slow – but why? And what impact would these new laws have on the companies and organizations that do business in those...
You asked, and we listened: NodeZero now offers an app via Splunkbase, enabling you to leverage NodeZero and the attacker’s perspective to improve the effectiveness of your Splunk deployments and ensure you’re logging the right data to get the most out of Splunk. The...