With the right safeguards and technologies in place, many hacks are preventable. A great example of this is the recent hack on Avast. According to ZDNet, a security breach impacted Avast’s internal network. It’s believed the purpose of the attack … Read More
Software Defined Perimeter

Multi-layered Security Via Network Access Control and Software Defined Perimeter
While Network Access Control (NAC) and Software Defined Perimeter (SDP) can both help improve your cyber security when used separately, they can do even more to help secure your network when used together as part of a multi-layered security plan. … Read More

Insider Threats Get Their Own Month
Awareness that insider threats are every organizations weak spot is worth spreading, to that end Impulse would like to help spread the word to our customers that this month is the first annual Insider Threat Awareness Month. The event is … Read More

Lessons From a 161 Million Record Database Data Breach
Each day, people share their information with websites in order to receive services. Unfortunately, those services can be insecure. According to scmagazine, a recent database data breach on a MoviePass subdomain exposed 161 million records. This could have potentially exposed … Read More

SDP Vs VPN —Why not the best of both?
Due to the frequent use of mobile devices and public Wi-Fi networks, resources often need to be accessible from anywhere. But this accessibility must be balanced with the need for security. Traditional VPNs enable secure remote access, but more is … Read More

VPN Vulnerability Shows Need for Software Defined Perimeter
The Department of Homeland Security issued a warning last month about VPN packages from F5, Palo Alto, Pulse, and Cisco. According to Network World, these packages might fail to properly secure tokens and cookies. This could enable cyber criminals to … Read More

What is the Zero Trust Model
Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More