Ditch Your VPN for ZTNA & We'll Buy Out Your VPN Support Contract – Click Here! Jellyfish Pictures Adopts RBI for TPN Compliance – Click Here! Zero Trust Market Dynamics Survey – Click Here!

Gerry Grealish

Gerry Grealish, ZTEdge CMO, is a security industry veteran, bringing over 20 years of marketing and product experience in cybersecurity, cloud, analytics, and related technologies. Responsible for marketing and business development, Gerry previously was at Symantec, where he led the product marketing and go-to-market activities for the company’s broad Network Security portfolio. Prior to Symantec, Gerry was at Blue Coat, which he joined as part of Blue Coat’s acquisition of venture-backed Cloud Access Security Broker (CASB) innovator, Perspecsys, where he was Chief Marketing Officer.

Protecting VFX Production Studios from Content Loss and Exposure featured image

Protecting VFX Production Studios from Content Loss and Exposure

Good news - VFX production studios are in high demand. Bad news - they are being targeted by hackers intent on stealing production content. RBI helps to protect studios.

Read More
The Evolving Technology of Cybercrime featured image

The Evolving Technology of Cybercrime

In this second post covering the 2021 IOCTA report, we discuss the increasing use of cloud-based “crime as a service” platforms and the convergence between plain old criminals and the cyber variety.

Read More
Update On Evolving Cybercrime Tactics featured image

Update On Evolving Cybercrime Tactics

The new IOCTA report describe how today’s cybercriminals have adopted increasingly strategic approaches to who they attack and how they do it – and are securing larger payouts as a result.

Read More
Over 50B Brute Force Attacks During the Summer of 2021 featured image

Over 50B Brute Force Attacks During the Summer of 2021

A recent cybersecurity report revealed that 55 billion new brute force attacks on RDP ports had been detected between May and August of 2021 - over 450 million attacks every day.

Read More
Identity & Access Management and ZTNA – Best Buddies featured image

Identity & Access Management and ZTNA – Best Buddies

Identity & Access Management (IAM) and Zero Trust Network Access (ZTNA) work together for successful implementation of Zero Trust security controls.

Read More
What Businesses (by size) were Targets of Ransomware Q1 2021? featured image

What Businesses (by size) were Targets of Ransomware Q1 2021?

Midsize enterprises (MSEs) are the preferred target for ransomware attacks. How are C-level execs are actively responding and what are their options?

Read More
9 Best Practices Depend on Identity and Access Management featured image

9 Best Practices Depend on Identity and Access Management

Strong Identity and Access Management (IAM) needs to be at the core of any organization’s cyber-defenses. These 9 security best practices depend on it.

Read More
SASE Architecture: The Evolution of Network Security featured image

SASE Architecture: The Evolution of Network Security

One emerging solution architecture that has gained traction to help secure modern distributed organizations is called Secure Access Service Edge (SASE).

Read More
Colonial Pipeline and VPN Vulnerabilities featured image

Colonial Pipeline and VPN Vulnerabilities

According to a Bloomberg report, the attack on Colonial Pipeline can be traced to the company's insufficient diligence in following a number of IT best practices related to its remote access solutions.

Read More
MSSPs – Win in the SASE Midsize Enterprise Market with ZTEdge featured image

MSSPs – Win in the SASE Midsize Enterprise Market with ZTEdge

Midsize enterprises, and the MSSPs that serve them, are typically an afterthought for big enterprise security vendors. Enter ZTEdge - the right solution at half the cost.

Read More