<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
blog /
What Is RBI? Remote Browser Isolation Explained

What Is RBI? Remote Browser Isolation Explained

In this article, we take a deep dive into Remote Browser Isolation (RBI), its history, and how it works. You'll learn about the common challenges associated with remote browser isolation and its importance in securing users from internet-based cyber threats. By the end of this article, you'll gain a complete understanding of remote browser isolation, as well as how it can be used to complement a Zero Trust framework.
Man-in-the-Middle (MITM) Attack: Definition, Examples & More

Man-in-the-Middle (MITM) Attack: Definition, Examples & More

In this article, we go over the man-in-the-middle attack definition and discuss the different types of these attacks. We'll take a deep dive into the dangers of man-in-the-middle attacks and address some examples. By the end of this article, you'll have a complete understanding of how a man-in-the-middle attack works and how to detect and prevent one.
Insider Threat: Definition, Types, Examples & Protection

Insider Threat: Definition, Types, Examples & Protection

In this article, we’ll take a look at insider threats in cyber security and the dangers they pose. You’ll learn the insider threat definition, who the insiders are, the types of insider threats to be aware of, and how to detect threats. By the end of this article, you’ll have a clearer understanding of the entire insider threat ecosystem and the best practices you can use to protect your organization, data, and systems.
Understanding Software-Defined Networking (SDN)

Understanding Software-Defined Networking (SDN)

In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation

A Beginner’s Guide to Microsegmentation

In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
What is an Attack Surface? (And the Best Way to Reduce It)

What is an Attack Surface? (And the Best Way to Reduce It)

Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
What Is Lateral Movement? (And How to Detect & Prevent It)

What Is Lateral Movement? (And How to Detect & Prevent It)

Lateral movement is when an attacker gains initial access to one part of a network and then attempts to move deeper into the rest of the network — typically via remote desktop tools or remote administration tools (RATs).
You Can't Have Zero Trust Without Identity and Access Management

You Can't Have Zero Trust Without Identity and Access Management

In a recent podcast, Gartner described the starting point for Zero Trust: Identity and Access.
7 Network Segmentation Best Practices to Level-up Your Security

7 Network Segmentation Best Practices to Level-up Your Security

Network segmentation is key to a modern security posture. Boost your network security and improve performance with these network segmentation tips.
StrongDM app UI showing available infrastructure resources
Connect your first server or database in 5 minutes. No kidding.