Mesh Blog

Avatar

Netanel Azoulay

24.10.2023

Okta Security Breach

#CSMA #Identity #ITDR #Zero Trust

Trust No One? Always Verify? In a recent security incident, identity services provider Okta reported that attackers gained unauthorized access to its support case management system using stolen credentials. This breach allowed the threat actors to exfiltrate sensitive active cookies and tokens uploaded by certain Okta customers. Then, the attackers maliciously used these active session […]

Read more
Avatar

Netanel Azoulay

19.09.2023

The MGM Hack

#Identity #ISPM #ITDR #Zero Trust

Don’t Gamble On Your Identities In this era of advanced cyber threats, no organization is invulnerable, regardless of its size or reputation. The cyberattack on MGM Casino serves as a stark reminder of the evolving and intricate threats. It emphasizes the urge to shift to an identity-first security approach and the imperative for tools like […]

Read more
Avatar

Netanel Azoulay

31.07.2023

What is CSMA (Cybersecurity Mesh Architecture)?

#Cloud Security #CSMA #Cybersecurity Mesh Architecture #Gartner #Identity #Zero Trust

Time To Build The Cybersecurity Mesh What is CSMA? As organizations transition from site-centric architectures to identity-first and distributed frameworks, the need for transformational security strategies becomes paramount. In response to evolving security threats, Gartner’s VP analyst, Patrick Hevesi, introduced the concept of Cybersecurity Mesh Architecture in 2021. CSMA aims to bridge the shortcomings of […]

Read more
Avatar

Netanel Azoulay

18.05.2023

ITDR

#Identity #ISPM #ITDR #ZeroTrust #ZeroTrustArchitecture

Mind The Gap In the rapidly evolving distributed digital landscape, organizations face increasing challenges in safeguarding their valuable assets against identity-centric cyber threats. The frequency and sophistication of data breaches that exploit credible identities have rendered traditional prevention, detection, and response measures insufficient. This is where Identity Threat Detection and Response (ITDR) comes into play. […]

Read more
Avatar

Netanel Azoulay

31.03.2023

4 Key Takeaways from Gartner IAM Summit

#CSMA #Future #Gartner #Identity #MeshArchitecture

The Gartner Identity and Access Management (IAM) Summit is an annual event that brings together IAM professionals to share their insights, knowledge, and best practices in the rapidly evolving field of IAM. This year, the summit provided a unique opportunity to learn about the latest trends and innovations in IAM, as well as to connect […]

Read more
Avatar

Netanel Azoulay

30.01.2023

Sad, But True: Why Organizations Will Likely Fail With Zero Trust

#Gartner #MeshSecurity #Mindset #ZeroTrustArchitecture #ZeroTrustNow #ZTA #ZTPM

Okta’s latest ‘State of Zero Trust’ report found that 97% of companies either have a Zero Trust initiative in place or will have one in the next 12-18 months. According to Gartner, over 50% will fail to realize the benefits, and just 10% of large enterprises will have a “mature and measurable” Zero Trust program […]

Read more
Avatar

Netanel Azoulay

01.01.2023

2023: The Year for a True Zero Trust Architecture (and Mindset).

#2023 #MeshSecurity #ZeroTrustArchitecture #ZeroTrustNow #ZTA

Zero Trust started as a philosophy a decade ago as an alternative to network-based perimeter security, and now it is the hottest term in the industry. However, merely debating about ‘Zero Trust’ won’t make it happen. Zero Trust in modern enterprises is still a scattered puzzle rather than a sustainable architecture that lacks a unified […]

Read more
Avatar

Omri Hering

24.11.2022

5 Ways Zero-Trust Security Can Keep Businesses Safe on Black Friday

#CloudSecurity #MeshSecurity #XaaS #ZeroTrust

Zero-trust security practices are essential to online shopping safety, especially during the Black Friday shopping season. Holiday seasons mean more engagement for businesses coupled with an increased attack surface. Shoppers spend billions of dollars each year during shopping seasons, and it’s essential for your employees to know how to keep sensitive information safe while they […]

Read more
Avatar

Netanel Azoulay

10.08.2022

Mesh Security Emerges From Stealth With $4.5M To Help Companies Drive Zero Trust In The Cloud, Reveals Broad Security Risk

#CloudSecurity #Fundraising #MeshSecurity #VC #XaaS #ZeroTrust #ZTA

Mesh implements Zero Trust principles across a company’s XaaS estate in minutes. Israeli cloud cybersecurity startup Mesh Security left stealth today and announced a $4.5 million seed round with the industry’s first Zero Trust Posture Management (ZTPM) solution. Mesh Security makes it simple for companies to implement a comprehensive Zero Trust Architecture (ZTA) security in […]

Read more
Avatar

Omri Hering

10.08.2022

Mesh Security Uncovers Broad MFA\SSO Bypass and Impersonation Risks in Okta and Other 100 Vendors

#Authentication Bypass #Mesh Security #MFA Bypass #XaaS #Zero Trust #ZTA

Trust No One? Always Verify? Mesh Security emerges from stealth today with $4.5 million seed funding to help companies drive Zero Trust in the cloud and reveals a broad security risk called “Cookeys” in Okta (and over 100 different vendors), exposing organizations to potential breach. Modern enterprises are shifting from perimeter-centric architecture to an identity-centric […]

Read more