Zero-Trust Architecture

How QWERX Moves the Needle on Zero Trust

What is Zero Trust? Despite what some may think, Zero Trust is not just a marketing buzzword that cybersecurity vendors love to trot out in their pitch decks. Zero Trust is a security framework requiring all users, whether in or outside the organization's network, [...]

How QWERX Moves the Needle on Zero Trust2023-03-16T20:47:06+00:00

Secure Machine Authentication for DevOps: Challenges + Solutions

As technology continues to evolve, so does the need to secure it. A well-run machine identity authentication protocol ensures that machines or devices have the appropriate access to resources, while also providing the DevOps team visibility and control over their activities. All businesses are [...]

Secure Machine Authentication for DevOps: Challenges + Solutions2023-03-02T16:25:52+00:00

QWERX for DevSecOps – Faster, Better, Stronger

DevSecOps has become both a best practice and a challenge in the world of software development and security. It offers a combination of the agility of DevOps with the security mindset of InfoSec. By integrating security into the development process, organizations can ensure that [...]

QWERX for DevSecOps – Faster, Better, Stronger2023-02-10T16:15:15+00:00

Zero Trust Is Only Part of the Solution. QWERX Goes Beyond.

The world can feel especially fraught with uncertainty and danger right now, and in fact, cyber risks top worldwide concerns in 2022. There were many high-profile breaches in 2021, and ransomware came on with a vengeance, targeting many small and medium businesses, underlining the importance [...]

Zero Trust Is Only Part of the Solution. QWERX Goes Beyond.2022-09-23T18:38:23+00:00

Oy Vey for OT: New Day, New Vulns for the Industrial Internet of Things

This Tech Republic article details new critical vulnerabilities uncovered by researchers at Claroty’s Team82, who were motivated to do their research based on the inexorable migration to the cloud for central management of industrial control systems (ICS) and other Operational Technology (OT), i.e., the things [...]

Oy Vey for OT: New Day, New Vulns for the Industrial Internet of Things2022-04-26T02:00:49+00:00

Your User is a Hacker. Is Your Network Too User Friendly?

Convenience will beat security if given the chance. Users compromise security with work-arounds for security practices that are inconvenient. We design systems that are reliant on our functional definition of a trusted user. All too frequently we have invited a trusted user into our network [...]

Your User is a Hacker. Is Your Network Too User Friendly?2022-04-26T19:37:57+00:00

Broken Trust: More Regulation Not the Answer

In a May 20 podcast hosted by The Cipher Brief, The Atlantic Council Cyber Statecraft Initiative discussed the Solarwinds/Sunburst attack that has shone a spotlight on supply chain vulnerabilities, and is covered in the Council’s recent report titled "Broken Trust: Lessons from Sunburst." A characteristic [...]

Broken Trust: More Regulation Not the Answer2022-04-28T03:13:02+00:00

How QWERX Is Fundamentally Different

Today network protection means intrusion and malware detection from inside the network after the attacker has penetrated the boundary of your system. This is a nightmare scenario. It means that -- assuming you detect the intruders -- the adversary is already inside your network. Adversaries [...]

How QWERX Is Fundamentally Different2022-04-28T14:11:33+00:00
Go to Top