Get a Demo Menu

How Baseline Security Practices Could Have Prevented Recent Cloud Attacks

One of the major issues, according to Aron Brand, CTO of New York City-based CTERA, is that organizations face a confluence of rising attacks and increasing attack surfaces as workers become more distributed post-pandemic. With the rise in edge users and devices, understand that user identities can be compromised, and that the communication source is now meaningless from a security standpoint, “he said. The bottom line is that enterprise managers must adopt a zero-trust policy. Verify any device or user trying to connect to their systems before granting access. “This is the essence of a zero-trust philosophy: systems should never rely on the communication source and should authenticate each access attempt from every endpoint, including devices on the LAN or VPN,” he added.


Skip to content