May 2, 2024
Versa UEBA incorporates GraphML to generate insights and detect anomalies in user relationship graphs. Anomaly and behavior detections are just the first step. We then need to quickly pivot into building the forensics to inform response and remediation. This can involve determining the origination point of a malicious activity or an attack and building the scope and scale of a potential breach.
April 17, 2024
In the rapidly evolving landscape of cyber threats, data protection has become a priority concern. Traditional security models are proving inadequate in the face of sophisticated attacks, leading organizations to seek out more dynamic and robust approaches to securing their data. The integration of Secure Access Service Edge (SASE) and Zero Trust architectures offers a promising approach to modern cybersecurity challenges. In this blog, we delve into how Versa Networks merges SASE and Zero Trust to ensure the protection of data in today’s landscape.
Director and Principal of Security, Versa Networks
April 3, 2024
Cloud security is mission critical especially in an environment where cyber threats have evolved in frequency and sophistication like never before making the need for highly efficient and robust cloud firewall solutions is undeniable. CyberRatings.org (CRO) is a cyber assessment firm focused on providing independent, objective ratings of security product efficacy based on real-world testing. They just finished a rigorous evaluation of eleven vendors in the Cloud Network Firewall space, including the Versa Next Generation Firewall (NGFW) for cloud deployments. This detailed analysis tested Cloud Firewall performance for key capabilities across: Routing and access control TLS/SSL functionality Stability and reliability…
Senior Product Manager
February 22, 2024
Securing the over three billion IoT devices globally connected to corporate systems via mobile networks presents a formidable and growing challenge for organizations worldwide. Driven by the adoption of newer IoT-specific cell technologies like LTE-M, NB-IoT, and LTE-Cat 1, along with a boom in 5G module shipments as older 2G and 3G modules are phased out, the number of cell-connected IoT devices is growing 27 percent a year, taking market share from Wi-Fi and Bluetooth connections. My recent collaboration with the network and security team of one of our industrial customers provided a front-row seat to the complexities of safeguarding…
February 15, 2024
Introduction: Interest in SASE has exploded with CIOs and CISOs alike. The promise of dramatic cost reductions, security improvements and improved agility delivered by a converged networking (SD-WAN) and security (SSE) infrastructure is compelling. However, today’s SASE solutions are commonly delivered on a shared global infrastructure of PoPs provisioned by a handful of technology vendors. This approach doesn’t always meet everyone’s requirements. A “shared” SASE approach is generally good enough for many companies, delivering unified networking and security capabilities with fast time to market and cloud/SaaS economics. But because these shared services lack any ability to control and manage service…
January 17, 2024
Cyber adversaries will stop at nothing to compromise any military systems, data, and missions. That’s why the U.S. Department of Defense (DOD) is adopting zero trust—a security framework that presumes networks are compromised and counters threats by design. All DOD organizations are expected to achieve “Target Level” Zero Trust Architecture by 2027. This requires multiple security functions to identify, authenticate, and authorize users or devices based on posture to securely connect to applications. As a result, the DOD turned to Booz Allen and Versa Networks to develop a security hardened Zero Trust Edge approach that will transform the DOD’s infrastructure…
Versa Networks
December 6, 2023
Zero Trust is widely considered to be the future of security for protecting networks, systems and data in both commercial and public sector organizations. The U.S. Department of Defense (DoD) has been making significant strides in modernizing its cybersecurity infrastructure in response to a presidential mandate to adopt a Zero Trust architecture.
December 5, 2023
On October 20, 2023, Okta disclosed a security incident affecting their customer support management system. In a note following that disclosure Okta said that from September 28, 2023, to October 17, 2023, a threat actor gained unauthorized access to files inside Okta’s customer support system associated with 134 Okta customers, or less than 1% of Okta customers.
Sr. Systems Engineer. Versa Networks
November 2, 2023
In recent years we’ve witnessed transformative changes in both technology and the retail industry. The retail world has seen tremendous ups and downs over the past several years thanks to the impact of COVID. In addition to challenges such as store closures, reduced foot traffic, and supply chain problems, digital disruptions include an increasing shift to e-commerce and new types of cyber threats that have dramatically changed how people shop and how retail businesses should operate. In the technology world, numerous stunning innovations such as AI/ML-assisted network operations and threat detection are making people’s jaws drop because of their capabilities…
Senior Threat Analyst, Versa Networks
October 26, 2023
Summary On October 16, 2023, Cisco reported two new vulnerabilities in the web UI for its Cisco IOS XE operating system that runs many of its routers and switches, CVE-2023-20198 and CVE-2023-20273. These vulnerabilities were initially being exploited by unknown hackers and affected more than 10,000 devices at the time of its first known existence. However, in the following days the attack was leveraged to affect more than 50,000 devices, and that’s when a free software fix was identified by Cisco to keep a check on devices. Cisco released the updated version 17.9.4a on October 23 to fix the issue….