ZTEdge Blog

The ZTEdge team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Why the Browser Continues to be the Top Threat Vector Exploited by Cyber Criminals

Actively defending your users' browsers, and not relying on them to recognize threats, using remote browser isolation is critical to protecting your network.

Read More

How Well Will Cyberinsurance Protect You When You Really Need It?

Faced with increasing numbers of attacks, cyberinsurers are writing more exclusions into policies and requiring more effective cyberdefenses.

Read More

Securing HIPAA – Interoperability versus Data Protection

If proper security for EMR systems are not put in place, there is increase risk of cyberattack, personal data exposure, and costly HIPAA violations.

Read More

Every Day is Game Day for Cybercrime

Sports teams depend on digital apps to run many business activities, but cyberattacks can result in lost revenue, reputational damage and legal risk.

Read More

mr. d0x Goes Phishing

Users are falling for new phishing attacks that are using fake sign-in forms, demonstrating (yet again) that enterprises must protect their users from phishing, instead of depending on users to protect themselves.

Read More

What Lawyers Need to Do to Defend Their Clients and Themselves from Cyber Risk

Given the centrality of trust in the relationships between law firms and their clients, law firms are frequent and attractive targets for cyberattacks.

Read More

As Gaming Moves to the Cloud, Web App Attacks Multiply

Gaming in general and cloud-based gaming services in particular are among the most attractive targets for cyberattacks.

Read More

Why Gaming Companies Should Follow the MPA’s Lead

In gaming leaks undermine the buzz companies work so hard to achieve and place sales – both upon release and into the future – at significant risk.

Read More

The Quest for Easy Money: The 2022 Cyberthreat Environment

In a recent report, ransomware and BECs take the prize as most-favored types of cyberattacks. A flourishing ransomware-as-a-service market makes attacks easier than ever, and offers a large menu of encryption options.

Read More