Nick Kael

A cybersecurity expert with over 20 years of experience in web technologies, architecture, infrastructure, networking and dev environments, Nick is responsible for solution management, technology strategy and technology partnerships. Nick was previously Symantec Group CTO for Global Service Providers, following his tenure as Director of the Chief Architect Team for Channel and Service Providers at Zscaler and an earlier position in the Symantec CTO organization. His certifications include CEH7, CCSK, BCCPP, Bluecoat Blue Knight, MCSE + Security, CCDP, CCNA, CCSA, VTP5 and VTSP5.

Time to Rethink Layered Security featured image

Time to Rethink Layered Security

In this post, we update the layered security concept for the age of Zero Trust, cloud computing, application-based work and work-from-anywhere.

Read More
Signed Proxy App Slips Malware Past Virus Detection featured image

Signed Proxy App Slips Malware Past Virus Detection

Malware samples embedded in pirated software and games silently installed proxies on millions of devices to create a malicious botnet, without users approving or even knowing that they were installed.

Read More
Despite Best Intentions, Humans Remain the Weak Link featured image

Despite Best Intentions, Humans Remain the Weak Link

When it comes to cybersecurity, the fatal flaw in the best practices to-do list is that every element requires every single IT manager and user to be completely on board, 100% of the time.

Read More
New Variant of Credential-Stealing Browser Malware featured image

New Variant of Credential-Stealing Browser Malware

The new Zaraza bot successfully decrypts encrypted user credentials stored in browsers and exfiltrates them to Telegram servers for purchase by aspiring cybercriminals.

Read More
Helping the Public Sector Drive Innovation and Security featured image

Helping the Public Sector Drive Innovation and Security

SaaS apps, collaboration platforms, and virtual meeting solutions can increase efficiency, they also increase exposure to cybersecurity risks.

Read More
The 3 Top Attack Vectors and How to Protect Government Agencies Against Them featured image

The 3 Top Attack Vectors and How to Protect Government Agencies Against Them

86% of cyberattacks are initiated through only three attack vectors. Shut them down and the odds of a breach at your organization drop significantly.

Read More
Not Just a Netflix Plotline: Nation-State Cyberattacks Get Real featured image

Not Just a Netflix Plotline: Nation-State Cyberattacks Get Real

As nation-state cyberattacks are more widely deployed and effective, it’s time for governments at every level to adopt strong Zero Trust defenses.

Read More
What Lawyers Need to Do to Defend Their Clients and Themselves from Cyber Risk featured image

What Lawyers Need to Do to Defend Their Clients and Themselves from Cyber Risk

Given the centrality of trust in the relationships between law firms and their clients, law firms are frequent and attractive targets for cyberattacks.

Read More
Stolen Cookies Enabling Financial Fraud featured image

Stolen Cookies Enabling Financial Fraud

In recently reported Adversary-in-the-Middle attacks, hackers bypass MFA by using session cookies that they illicitly extract from HTTPs requests, via reverse proxies.

Read More
Reducing Compliance Risk with Web Application Isolation (WAI) featured image

Reducing Compliance Risk with Web Application Isolation (WAI)

Regulated industries like healthcare and financial services are facing an increasingly complex regulatory environment.

Read More