Software Defined Perimeter

Learn about Insider Threat Awareness Month and the Process of mitigating insider threats.

Insider Threats Get Their Own Month

Awareness that insider threats are every organizations weak spot is worth spreading, to that end Impulse would like to help spread the word to our customers that this month is the first annual Insider Threat Awareness Month. The event is … Read More

Data breach database

Lessons From a 161 Million Record Database Data Breach

Each day, people share their information with websites in order to receive services. Unfortunately, those services can be insecure. According to scmagazine, a recent database data breach on a MoviePass subdomain exposed 161 million records. This could have potentially exposed … Read More

In the SDP Vs VPN debate, SDP has a use case as a next generation VPN.

SDP Vs VPN —Why not the best of both?

Due to the frequent use of mobile devices and public Wi-Fi networks, resources often need to be accessible from anywhere. But this accessibility must be balanced with the need for security. Traditional VPNs enable secure remote access, but more is … Read More

VPN vulnerability that shows the need for Zero Trust Network Access.

VPN Vulnerability Shows Need for Software Defined Perimeter

The Department of Homeland Security issued a warning last month about VPN packages from F5, Palo Alto, Pulse, and Cisco. According to Network World, these packages might fail to properly secure tokens and cookies. This could enable cyber criminals to … Read More

Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More