Rethinking 802.1x

This article continues our series on “Multi-Layered Access Control,” which seeks to explore various approaches to network visibility and access control. While our last piece dealt with ARP-based strategies for securing endpoints, we now consider how the 802.1x protocol can be used as part of a broader, multi-faceted approach – offering operators a range of […]

The Biggest Cybersecurity Threats are Coming from Inside

Whether your organization is a business or involved in government, one of the highest cost scenarios is when there is a security event that originates with an inside source like an employee or contractor. That’s because these people often have unfettered access to the most sensitive information while not being able to be properly tracked. […]

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms