Most recent

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be trusted and everything — and everyone — should be verified.

Read More
14 Jan 2019

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.

Read More
17 Dec 2018

How to Speed Up DevOps in 3 Steps

DevOps is at a difficult transition point. Once the sole domain of startups looking to “move fast and break things”, the DevOps philosophy is now being taken up by large incumbents and Fortune 500 companies – and failing.

Read More
12 Sep 2018

SWIFT Cyber-Attackers Strike Again - Organizations Must Turn to the Software Defined Perimeter

Cyber-attacks targeting the SWIFT inter-bank transfer system have blighted the financial services industry worldwide over the past two years. Now yet another major attack has been foiled after Malaysia’s central bank blocked an attempted fraudulent transfer of funds via SWIFT. 

Read More
01 May 2018

Safe-T’s Top 6 Cybersecurity Predictions for 2018

Knowing what's changing in the tech world is a crucial way to drive your own IT department and compete in business. For example, over the past year, quite a few CISOs and other execs have had to brush up on their knowledge of trends like cloud service delivery and container virtualization. 

Read More
18 Dec 2017

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!