Vidder Blog

Greg Ness

Recent Posts

Securing Office 365 / SaaS

Posted by Greg Ness on Apr 2, 2018 3:39:52 PM

Interested in learning how adversaries are attacking SaaS?  Check out this new Vidder white paper: Securing Office 365 and other SaaS.

Read More

Topics: Securing Office 365

Segmentation: Where to Begin?

Posted by Greg Ness on Feb 15, 2018 1:03:18 PM

A New Paper Suggests it’s Time to Think Differently about Segmentation

The perimeter protecting the network, once considered impregnable, has been degraded by advanced threats and an explosion in the number of connected devices (and apps running on them) and a new generation of predatory malware attacks.

Since the dawn of the networking era, enterprises built open (flat) networks to offer every user access to (almost) every application. Many of these networks are global, spanning business units and national boundaries with unprecedented connectivity. Amazing. Powerful. Everything and everyone is accessible.

Read More

Topics: segmentation, security

What Happens in Ukraine Doesn’t Stay in Ukraine

Posted by Greg Ness on Feb 12, 2018 6:05:54 PM

Second Panel on Ukraine Held at GWU

Read More

Topics: Ukraine, cyberwar

How to Build a Secure Enclave on AWS

Posted by Greg Ness on Nov 27, 2017 6:00:00 AM

Over the last few years there has been significant security improvements in public clouds.  For example, AWS now offers transparent data encryption, key management and secure compute features. Unfortunately, even with the advances in public cloud computing, organizations like financial institutions have been unable to leverage these services because many analysts work in secure facilities that have no Internet access.

Read More

Topics: software defined perimeter, secure enclaves, AWS secure enclave, reinvent2017, confidential cloud

Vidder Can Help You Protect Applications from Untrusted Users

Posted by Greg Ness on Nov 17, 2017 9:05:00 AM

PrecisionAccess can be a force multiplier for your security team by future proofing your existing infrastructure against advanced attacks, including credential theft, predatory malware and man-in-the-middle. Software Defined Perimeter and Trust Assessment technology combine to obfuscate servers until user and device trust is established and access is granted to a single application or groups of applications.

Read More

Topics: software defined perimeter, application security, trust assessment

Secure Enclaves: Public Clouds for Confidential Workloads

Posted by Greg Ness on Nov 13, 2017 5:54:24 PM

One of the most significant new opportunities for public cloud is the processing and storage of regulated data.  Until recently the idea was deemed heretical, mainly due to regulatory, compliance costs and the difficulty in interlocking physical and virtual security controls.  That has changed due to a recent Vidder project for a public financial services firm with more than $10B in assets.

Read More

Topics: AWS secure enclave, Vidder secure enclave, software defined perimeter, secure enclaves

Russia’s Cyber War Testing Ground

Posted by Greg Ness on Oct 30, 2017 2:21:54 PM

If you’re wondering what security challenges will look like in the near future study Ukraine, Russia’s testing ground for cyber war.  Last week at Future In Review we heard a series of chilling predictions from one of Ukraine’s top cyber security officials, Dmytro Shymkiv, supplemented with insight from global infowar experts Bob Flores (former CTO of the CIA) and Phillip Lohaus (American Enterprise Institute). The panel has since been covered in Newsweek, The Daily Caller and Smartup.

Read More

Topics: cyberwar, Russia, Ukraine

Cloud, Digitalization and Advanced Attacks are Breaking the Old Stack

Posted by Greg Ness on Oct 9, 2017 2:57:57 PM

Let’s face it. The current security stack of firewalls amalgamated with a dozen other security products has been rendered irrelevant by advanced cyberthreats, from predatory malware to credential theft and man-in-the-middle attacks. And with certainty we can predict more attacks (and larger attacks) into increasingly sensitive apps and databases.

Read More

Topics: secure enclaves, trusted access control, firewall as a service

About Vidder

Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.

Subscribe to Email Updates

Recent Posts