Zero Trust in Practice: What Actually Breaks in Real Environments
Most Zero Trust discussions sound great on paper—but implementation tells a different story. From recent hybrid deployments, here’s what actually breaks: Identity gaps Service accounts without MFA Legacy apps bypassing Conditional Access Device trust issues -Non-compliant endpoints still accessing critical apps -BYOD without proper posture checks Network assumptions Internal traffic still implicitly trusted Flat VLANs enabling lateral movement What worked well: Enforcing Conditional Access (device + user risk) ZTNA replacing VPN for application-level access -Micro-segmentation (Fortinet / host-based controls) Key takeaway: Zero Trust is not a product—it’s a continuous enforcement model across identity, device, and network layers.700Views2likes0CommentsMFA Downgrade Attacks: Good to know.
Short article on MFA downgrade attacks; provides the basics on what it is and how to defend. Good to know for considering your own policies and processes when folks lose devices. https://www.scworld.com/perspective/why-mfa-downgrade-attacks-could-be-the-next-ai-security-crisis200Views0likes1CommentHave you encountered any instances where QR codes were used as part of a phishing attempt targeting your organization?
What steps did you take to immediately secure your organization and to improve education of the staff? Check out this article, Navigating the Threat of QR Codes as a Gateway to Data Theft.125Views0likes0CommentsCybersecurity: A Team Sport?
In this Pure Report, Jason Walker and Jason Langer explain why cyber resilience needs to break down silos between IT and security teams. With cyber threats on the rise, teamwork is key! Which of the NIST framework areas does your team collaborate on the most?116Views0likes0CommentsA simple way to visualize the need for Cyber Resilience
The need for cyber resilience is persistent. I use these sites to help me show folks that attacks and malicious activity are non-stop!!! Real-time and graphical, a good reminder to keep Cyber Reliance as a top priority: Checkpoint: https://threatmap.checkpoint.com/ BitDefender: https://threatmap.bitdefender.com/ Radware: https://livethreatmap.radware.com/maintenance/maintenance.html And for a summary on Ransomware, Ransomware Live: https://www.ransomware.live/114Views0likes0CommentsModernizing Mainframe backups for Comprehensive Cyber Resilience Strategy
I've been talking to our Healthcare Payer customers, as well as almost all of the Fortune 500, about how Pure can help to incorporate Mainframe backup and recovery into their overall Cyber Resilience strategy. It is best practice to protect your data across the enterprise and with our Luminex + Pure solution, all your data can be protected under one plan. I'm interested to hear if anyone else is finding challenges with this process.113Views2likes0CommentsIs it possible to be fully prepared for all cyber threats?
I don’t know about you, but I can’t help but feel a little overwhelmed with the constant need for better cybersecurity. Do you think it's possible to ever be fully prepared for all the different kinds of threats out there? Ever wondered how hackers exploit your network? Check out this blog to see how the “Pass-the-Hash” attack works and what you can do to protect your systems from it. It’s eye-opening!112Views0likes0Comments