Zero Trust | Red Access

Zero Trust Browsing: Protecting Your Organization From User Error

Over the past couple of years, “Zero Trust” has become one of the most talked about topics in cybersecurity. It seems that, no matter what category of cybersecurity you’re discussing, the ...

Hybrid Work Security | Red Access

Hybrid Work Security: Why a Proactive Approach is Key

Despite the concerted effort some corporations are making for a back-to-office push, the fact of the matter is that most will likely retain the hybrid ...

Chrome vs. Chromium | Red Access

Chromium vs. Chrome: An Important Distinction in the Age of Browsing Security

Until recently, web browsers served as largely leisure-time tools. These tools were designed for everyday internet users to shop, socialize, or catch up ...

BYOD Security Solutions

The Importance of Investing in BYOD Security Solutions

In today's work environment, where hybrid work is becoming increasingly common, "Bring Your Own Device" (BYOD) policies are quickly becoming the norm. ...

State of Hybrid Work and Browsing Security Survey Report

New Survey Reveals Browsing-Based Threats are CISOs’ #1 Concern

Last week, we published our first ever State of Hybrid Work and Browsing Security Survey Report . The study, based on the responses of 300 chief ...

Remote Work Security

Remote Work Security: Essential Threats and Solutions

The rise of hybrid and remote work has been transformational for employees and enterprises alike. While workers enjoy increased work-life balance and ...

Red Access - It’s Time to Put an End to Security Agent Overload

It’s Time to Put an End to Security Agent Overload

The average enterprise has as many as 45 security tools deployed at any given time. Among large enterprises, that figure climbs even higher, with an ...

Red Access - 2023 Predictions

2023 Predictions: What to Watch for in Today’s Changing Cybersecurity Landscape

Now that the hybrid workforce is here to stay, the rules of enterprise cybersecurity have also been forever altered. Traditional notions of the ...

Red Access - Browsing Security - New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

On October 31, GitHub user Echo , posted an exploit that targets Google Chrome and allows attackers to disable any extension installed on the web ...

Red Access - Browsing Security - Zoombombings Reveal Need for New Session-Based Approach to Browsing Security

VPNs, RBI Are No Longer Enough: Zoombombings Reveal Need for New Session-Based Approach to Browsing Security

In April of this year, Zoom paid out an $85 million dollar settlement to users of its platform who’d fallen victim to “Zoombombing” (a.k.a. ...

Red Access - Browsers vs. Browsing: The Divide That Will Define the Future of Browsing Security

Browsers vs. Browsing: The Divide That Will Define the Future of Browsing Security

When it comes to understanding web browsing, the English language hasn’t done us many favors. There was once a time when all web browsing took place ...

SUBSCRIBE TO BLOG
Loading
Categories
open popup