Vidder
Vidder
Blog Post
Vidder
Vidder
Blog Post
  • Mental inertia. That’s what it is. I have noticed that most professionals contributing to enterprise network security continue to operate under the following tenets which have shaped their behaviors for decades: The corporate network is vastly important. It is critical to secure all aspects of this vastly important resource. Embedding security into the network is the most efficient way t...

Vidder
Vidder
Blog Post
  • According to the 2017 Verizon Data Breach Investigations Report “81% of hacking-related breaches leveraged either stolen and/or weak passwords.”    A solution to this problem is to use Multifactor Authentication to prevent a stolen password from being enough for an adversary to gain access to critical systems.  This has been true for a long time.  Yet MFA is still only used for specific use cas...

Vidder
Vidder
Blog Post
  • The corporate network, once a great enabler of business productivity, is rapidly becoming an obstacle. This is leaving CIOs with no choice but to make a strategic withdrawal away from defending global and integrated corporate networks, towards more secure-able and relevant perimeters.  There is no other way forward.

Vidder
Vidder
Blog Post
  • A New Paper Suggests it’s Time to Think Differently about Segmentation The perimeter protecting the network, once considered impregnable, has been degraded by advanced threats and an explosion in the number of connected devices (and apps running on them) and a new generation of predatory malware attacks. Since the dawn of the networking era, enterprises built open (flat) networks to offer eve...

Vidder
Vidder
Blog Post
  • Second Panel on Ukraine Held at GWU Last fall we discussed how digital societies are more vulnerable to cyber mayhem and cited the recent Future in Review panel on Ukraine’s cyber war. Last week a follow-on panel was held at George Washington University: The U.S.-Ukraine Cybersecurity Partnership.

Vidder
Vidder
Blog Post
  • One of the most significant new opportunities for public cloud is the processing and storage of regulated data.  Until recently the idea was deemed heretical, mainly due to regulatory, compliance costs and the difficulty in interlocking physical and virtual security controls.  That has changed due to a recent Vidder project for a public financial services firm with more than $10B in assets.

Vidder
Vidder
Blog Post
  • Over the last few years there has been significant security improvements in public clouds.  For example, AWS now offers transparent data encryption, key management and secure compute features. Unfortunately, even with the advances in public cloud computing, organizations like financial institutions have been unable to leverage these services because many analysts work in secure facilit...

Vidder
Vidder
Blog Post
  • PrecisionAccess can be a force multiplier for your security team by future proofing your existing infrastructure against advanced attacks, including credential theft, predatory malware and man-in-the-middle. Software Defined Perimeter and Trust Assessment technology combine to obfuscate servers until user and device trust is established and access is granted to a single application or ...

Vidder
Vidder
Blog Post
  • One of the most significant new opportunities for public cloud is the processing and storage of regulated data.  Until recently the idea was deemed heretical, mainly due to regulatory, compliance costs and the difficulty in interlocking physical and virtual security controls.  That has changed due to a recent Vidder project for a public financial services firm with more than $10B in as...

Vidder
Vidder
Blog Post
  • If you’re wondering what security challenges will look like in the near future study Ukraine, Russia’s testing ground for cyber war.  Last week at Future In Review we heard a series of chilling predictions from one of Ukraine’s top cyber security officials, Dmytro Shymkiv, supplemented with insight from global infowar experts Bob Flores (former CTO of the CIA) and Phillip Lohaus (Ameri...

Vidder
Vidder
Blog Post
Vidder
Vidder
Blog Post
  • Here’s Why It Matters In a “tip of the hat” to how polluted devices and networks have become, VMware and Verizon announced new service offerings to protect applications from cyber attacks.  VMware announced App Defense at VMworld a few weeks ago. Vidder announced yesterday that its technology is being integrated into a new Verizon Software Defined Perimeter managed service for pro...

Vidder
Vidder
Blog Post
Vidder
Vidder
Blog Post
  • Last month I spoke with a security architect at a Fortune 100 enterprise serving a network of hundreds of thousands of company and partner employees in almost 200 countries. Talk about a networking and security challenge. His comments inspired a blog about security process creep and the exponential increase in demands on security teams experiencing even incremental growth.

Vidder
Vidder
Blog Post
  • Security breaches are now a fact of life for almost all organizations.  New attacks don’t respect traditional boundaries and perimeters, from a country’s borders to enterprise firewalls and intrusion prevention systems. This means that the definition of national security within a cyber context is limited to government institutions, not organizations with operations within a nation’s bo...

Vidder
Vidder
Blog Post
  • Today breaches are simply a fact of life in the cyber age. A report tracking the largest breaches of 2017 also said breaches in 2016 had increased by 40% (over 2015 - including the Yahoo compromise of more than one billion accounts) and that 2017 “could get even more messy and more serious.”

Vidder
Vidder
Blog Post
  • Currently information solutions for First Responders are built using customized, highly complex and costly communications and application systems. While the adoption of mobile devices and public clouds have become the norm for enterprises these have been considered too risky for emergency services. Until now. 

Vidder
Vidder
Blog Post
  • The Season 7 trailer of Game of Thrones came out today and fans were excited to see that’s going to be bloody war. While Thrones is a fantasy show its strength comes from being a metaphor for real world conflicts.

Vidder
Vidder
Blog Post
  • In the past five months there have been two cyber attacks that combined age-old email phishing with lateral movement to greatly increase their lethality. In February of this year the Saudi Arabian government was hit with a phishing attack that installed a program to delete data.  The attackers were able to increase the blast radius of the attack by using a stolen domain credentials to ...