Login details are criminals’ favorite type of data, as they allow complete impersonation of a legitimate user on your system. By successfully compromising an account, an attacker becomes a wolf in sheep’s clothing, appearing completely innocuous until they launch their attack. One of the most common consequences of cracked credentials is a data breach, the […]
Cloud Security
Technology, security threats and competition – they all change rapidly and constantly. Your security stack must therefore be ahead of every emerging threat, but just as importantly, enable full-speed business processes by reducing friction in critical workflows.
-
Myths About Credential Phishing You Can’t Ignore While ransomware, securing the cloud, and sprawling IoT vulnerabilities are keeping our CISO’s up at night, credential phishing is a consistent threat, plaguing their employees. Credential Phishing is the practice of stealing user ID/email address and password combinations, by masquerading as a reputable or known entity or person in email, instant message, or another communication […]
6th June, 2022 -
How Separating Data & Network Security Protects Your Supply Chain Software supply chain security is an enormous concern for businesses today. According to a 2021 Argon cybersecurity report, software supply chain attacks increased threefold in 2021 compared to the previous year. The constant race of companies to do things faster while delivering a better, richer user experience adds a multitude of vulnerabilities to the supply […]
9th May, 2022 -
SASE vs. SD-WAN: A Quick Guide New technologies have a wicked tendency to pile up. With cloud solution categories now emerging on a weekly basis, the result of bringing them into your estate is usually more complexity and confusion. But sometimes, a single new technology allows us to rid a bunch of old ones in a snap. SASE pretends to be […]
9th May, 2022 -
Remote work & WFH Policies: FAQs Answered We were recently approached by the press to provide some policy guidelines for companies adopting the hybrid or 100%-remote model. Truth be told, GlobalDots’ legacy of remote work dates back to the surge of Skype. Yes, we’ve been working remotely for quite a while, so for us, the Pandemic didn’t change much. It is this […]
20th April, 2022 -
Infographic: Identity Automation Impact & Case Studies 75% of the IT work related to the employee lifecycle can be automated. For 56% of the organizations, this is the #1-priority workflow automation to implement. In the infographic below you’ll explore:
24th March, 2022 -
2022: The Year End-User Accounts Go Passwordless Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]
23rd February, 2022 -
Technical Whitepaper: Biometric Passwordless Authentication (FIDO2 WebAuthN) The booming cost of account takeover (ATO) attacks, from $4BN in 2020 to $16BN in 2021, makes passwordless authentication a truly pressing need for all businesses. Most current “passwordless” technologies still contain shared secrets and friction – deeming them irrelevant to the world’s most prominent workforce and buying power: Gen Y and Gen Z. Biometric […]
23rd February, 2022 -
Securing Chaos: Data-Driven Workload Protection for Today’s Cloud Challenges Securing today’s complex public cloud environments is really a data problem. While Cloud Workload Protection has greatly evolved over the last few years, it only does it halfway. In this webinar you’ll:
30th January, 2022 -
Protecting Cloud Workloads from Data Breaches: Inside Radware’s CNP How many of your users’ cloud permissions are actually necessary? Can there be one source of truth for vulnerabilities in multi-cloud environments? And how hard is auto-hardening? This demo is all about answering these questions. Watch GlobalDots solutions engineer Steven Puddephatt break down the basics of Cloud Workload Protection, and explore one of today’s category […]
13th January, 2022 -
Keep the Capabilities, Lose the Vulnerabilities: Snyk’s Open Source Security Solution Open source code is only as safe & reliable as your ability to scan it. Dependencies don’t only jam production – they might also pose real security risks. This is what makes an automated Open Source Security solution so vital to your cloud security stack. In this demo, our solution architect Steven Puddephatt will walk […]
13th January, 2022 -
GlobalDots Equips Armis with Radware CWP IoT security vendor Armis keeps trusting GlobalDots and Radware for its public cloud security needs. GlobalDots is a long-standing technology partner of IoT security vendor Armis, responsible for a great deal of Armis’ innovative IT infrastructure, such as Identity & Access Management (Okta) and Cloud Cost Reduction (Cloudzero). Now, GlobalDots helps Armis secure its public […]
2nd January, 2022 -
How to Keep Hackers Out of Your Distributed Environment New normal, new challenges One of the outcomes of COVID-19 has been our newfound openness to remote work. According to a recent PwC survey, 41% of workers would now prefer their workdays to be fully remote, compared with 29% in January 2021, signaling the desire to work remotely is only ramping up. For cybersecurity teams, this new reality brings […]
19th December, 2021