All Research Sponsored By:Nexum

A Tale of Two Conventions: Black Hat and DEF CON 30
BLOG: This article presents an account of both conventions, analyzing how each showcased innovations within the security market in a completely different style and format. The article then goes on to provide insight into which conference you should attend depending on what secuirty topics you are interested in. Continue reading to learn more.
Posted: 01 Nov 2022 | Published: 01 Nov 2022

TOPICS:  .NET

Documentation from Visibility
BLOG: As organizations continue to deploy systems and software of an ever-increasing sophistication, the more difficult it becomes for security teams to maintain visibility.In this 4th installment of Nexum’s Visibility Series, they discuss the importance of documentation and visibility in operational cybersecurity. Continue reading to learn more.
Posted: 29 Oct 2022 | Published: 29 Oct 2022

TOPICS:  .NET

Acronym Series Introduction
BLOG: Cybersecurity is filled with acronyms and terms that can be difficult to fully understand, which can lead to confusion and intimidation for potential interested parties. In this blog post, Nexum introduce their Acronym Series, which aims to spread cybersecurity awareness by providing explanations of various acronyms. Read now to learn more.
Posted: 28 Oct 2022 | Published: 28 Oct 2022

TOPICS:  .NET

Cloud Networking: From Magic Smoke to Black Boxes
BLOG: Cloud networking was once hailed as the savior of the entire tech community. While DevOps has embraced it, security and networking continue to find challenges with managing and scaling. This blog post looks at cloud networking, analyzing how it operates differently to traditional networking. Continue reading to learn more.
Posted: 28 Oct 2022 | Published: 28 Oct 2022

TOPICS:  .NET

ZTNA: Zero Trust Network Access
LANDING PAGE: ZTNA is one of the hottest acronyms in the cybersecurity space. While many people know what it stands for, different interpretations focus on different things.Go onto the landing page now to learn about ZTNA, through a succinct definition, as well as an in-depth explanation going into its origin and significance.
Posted: 26 Oct 2022 | Published: 26 Oct 2022

TOPICS:  .NET

EDR: Endpoint Detection Response
LANDING PAGE: You’ve probably heard of EDR, but with so many acronyms in the security space, you may not know what it stands for or what it really means.Access this exclusive landing page to explore expert opinions and explanations of EDR’s origin and modern importance.
Posted: 25 Oct 2022 | Published: 25 Oct 2022

TOPICS:  .NET

SSL: Secure Sockets Layer Acronym Series
LANDING PAGE: You may have heard of "SSL: Secure Sockets Layer" but there hasn't been a consistent definition/assessment of the scope of the term...until now.Go onto the landing page now to learn about SSL, through a succinct definition, as well as an in-depth explanation going into its origin and significance.
Posted: 22 Oct 2022 | Published: 22 Oct 2022

TOPICS:  .NET

CISO Guide to Ransomware
WHITE PAPER: Unless Ransomware is stopped before reaching end users, it will continue to cause severe financial losses and reputational damage—and continue to pad the pockets of cybercriminals. Open this guide to explore the ins and outs of ransomware and how to prevent it.
Posted: 22 Jun 2022 | Published: 23 Jun 2022

TOPICS:  .NET

Prevent Ransomware with SASE Ransomware Series Part 2
BLOG: In part 2 of Nexum’s ransomware series, Principal Engineer George Grzyb will continue where he left off in part 1, expanding on the basic threats and ideas behind ransomware and moving onto the technology that is crucial towards prevention and defense. Read the full blog to learn more about SASE and its role in preventing ransomware.
Posted: 26 May 2022 | Published: 26 May 2022

TOPICS:  .NET

Palo Alto Networks BPA+ Review Partner Update
BLOG: What has your firewall done for you lately? According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.I know what you’re thinking. Access this blog to learn how Palo Alto Networks has already made things easy for you with their Best Practice Assessment Plus (BPA+).
Posted: 21 Apr 2022 | Published: 22 Apr 2022

TOPICS:  .NET

Attack Observations Since the Russian Invasion of Ukraine
BLOG: Due to ongoing geopolitical events, zero-day exploits have become more of a concern for organizations around the globe. Tap into this blog article to learn 10 tips for reducing risk to your organization.
Posted: 01 Apr 2022 | Published: 01 Apr 2022

TOPICS:  .NET

The Issue With Open-Source Code Utilization
BLOG: Due to ongoing geopolitical events, some individuals have begun to “poison” major open-source projects to try to cause damage. Access this blog article to learn complications with open-source code utilization.
Posted: 30 Mar 2022 | Published: 31 Mar 2022

TOPICS:  .NET

Network Alerting Visibility Series Part 3
BLOG: One of the primary things Information Technology (IT) and security teams continue to contend with are alerts. In this blog article, learn why the lines between SIEM and SOAR have blurred, the role SIEM plays in response at scale and more.
Posted: 23 Feb 2022 | Published: 24 Feb 2022

TOPICS:  .NET

Cloud Security Frameworks and 10 IAM Tools for Network Security
EGUIDE: Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021

TOPICS:  .NET

Flashlight on ShadowIT
LANDING PAGE: Shadow IT refers to the systems or applications that are used without the knowledge, or consent, of an organization’s IT department – leading to exposed sensitive information. Instead of implementing brand new tools, you can best leverage your existing tools. Read on to learn how to bring these tools together.
Posted: 14 Oct 2021 | Published: 14 Oct 2021

TOPICS:  .NET

Endpoint Security E-guide
EGUIDE: Read this e-guide to fully understand the importance of endpoint security, how it works and 6 crucial components to look for in an endpoint security platform.
Posted: 14 Sep 2021 | Published: 09 Sep 2021

TOPICS:  .NET

Ransomware Disruption Overview: Ransomware Series Part 1
BLOG: You’ve heard about ransomware quite a bit in the news lately, but why is this the case? In this blog post, get an in-depth look at how ransomware works, why the risk of ransomware is higher than ever before and security methods for ransomware prevention, such as a cloud access security broker (CASB), DNS security and more.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TOPICS:  .NET

Tackling the Visibility Monolith: Visibility Series Part 1
BLOG: Visibility in its purest form is when different teams have different views into how their systems communicate across the entire enterprise. Nexum aims to help customers reexamine how they are approaching visibility. Read on to learn more.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TOPICS:  .NET

The Complete Pocket E-Guide to Cloud Security
EGUIDE: As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.
Posted: 26 Aug 2021 | Published: 26 Aug 2021

TOPICS:  Cloud Security