

Search results
625 results found with an empty search
- AlgoSec | 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025?
A quarter-by-quarter review of AlgoSec’s 2025 covering key product launches like Horizon, our latest research on zero trust and convergence, customer milestones, and the industry recognition that defined our year. AlgoSec Reviews 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? Adel Osta Dadan 2 min read Adel Osta Dadan Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/18/25 Published As we close out 2025, I find myself reflecting on what has been an extraordinary journey for AlgoSec. This year was marked by breakthrough innovations, significant industry recognition, and an unwavering commitment to our vision of secure application connectivity. From launching game-changing solutions to earning accolades on the global stage, 2025 challenged us to push boundaries – and we rose to the occasion with confidence and purpose. Every challenge met, every milestone achieved, has reinforced our resolve to lead in network security policy management across hybrid cloud environments. The story of AlgoSec in 2025 is one of innovation validated by the industry and, most importantly, by the trust of our customers. In this featured year-end review, I’ll walk through AlgoSec’s 2025 journey quarter by quarter. It’s a personal narrative from my vantage point as someone fortunate enough to help shape our story. The tone is proud and forward-looking because the accomplishments of this year have set the stage for an even more ambitious 2026. So let’s dive in, quarter by quarter, into how 2025 unfolded for AlgoSec – a year of solidifying leadership, fostering innovation, and securing connectivity for enterprises worldwide. Q1 – Launching a new horizon in hybrid cloud security The first quarter of 2025 was all about bold beginnings. We started the year by challenging the status quo in hybrid network security and laying the groundwork for everything to follow. Launch of the AlgoSec Horizon platform: In February, we unveiled AlgoSec Horizon , our most advanced application-centric security management platform for converging cloud and on-premise environments. This wasn’t just a product launch – it was a statement of direction. AlgoSec Horizon is the industry’s first platform to unify security policy automation across hybrid networks, giving teams a single pane of glass for both cloud and data center connectivity. By applying AI-driven visibility and risk mitigation, Horizon allows security teams to consistently manage application connectivity and policies across any environment. “Today’s networks are 100x more complex... requiring organizations to unify security operations, automate policies and enhance visibility across infrastructures,” as our VP of Product Eran Shiff noted at launch. With Horizon, our customers gained full visibility into their hybrid-cloud network and the power to remediate risks without slowing down the business. We even showcased Horizon live at Cisco Live 2025 in Amsterdam, letting attendees see firsthand how it simplifies hybrid cloud security. This Q1 milestone set the tone for the year – proving that we don’t just adapt to industry shifts, we lead them. Continuing analyst recognition and thought leadership: Building on momentum from the previous year, we carried forward strong validation from industry analysts. AlgoSec entered 2025 still highlighted as a Market Outperformer in GigaOm’s recent Radar Report for Cloud Network Security. In that report, analyst Andrew Green praised our core strength: “AlgoSec automates application connectivity and security policy across the hybrid network estate including public cloud, private cloud, containers, and on-premises networks.” Such independent insight validated our unique, application-centric approach. Internally, these early recognitions energized our teams. We doubled down on R&D and prepared to share our expertise more broadly – including wrapping up work on our annual research report. Q1’s focus on innovation and expert validation paved the way for the accomplishments that followed in subsequent quarters. Q2 – Thought leadership and industry accolades on the global stage If Q1 was about innovation, Q2 was about validation. In the second quarter, AlgoSec stepped onto the global stage at RSAC 2025 and emerged with both influential research and prestigious awards. It was a period where our thought leadership in secure connectivity met with resounding industry recognition. State of network security report 2025: In April, we released our annual State of Network Security Report , a comprehensive vendor-agnostic study of emerging trends and challenges in network security. This report quickly became a cornerstone of our thought leadership. It revealed how businesses are prioritizing multi-cloud strategies and zero-trust architecture in unprecedented ways. For instance, zero-trust adoption reached an all-time high – 56% of organizations reported they had fully or partially implemented zero-trust by 2025. We also highlighted that multi-cloud environments are now the norm, with Azure rising to become the most widely used cloud platform among respondents. Perhaps most telling was the finding that automating application connectivity ranked as the top priority for minimizing risk and downtime [9] . These insights underscored a message we’ve championed for years – that security can and should be an enabler of business agility. By shining a light on gaps in visibility and the need for policy automation, our Q2 research reinforced AlgoSec’s role as a thought leader in secure application connectivity. The report’s influence was evident in conversations at industry events and in how customers approached their network security strategy. Awards at RSAC 2025 – best security company and more: The highlight of Q2 came during the RSA Conference in late April, when AlgoSec earned two major industry accolades in one week. SC Media honored AlgoSec with the 2025 SC Award for Best Security Company, a recognition of our impact and innovation in cybersecurity. At the same time, Cyber Defense Magazine announced us as a winner of a 2025 Global InfoSec Award for Best Service – Cybersecurity Company [11] . Securing these prestigious awards simultaneously was a proud and humbling moment. It marked a significant milestone for our team as we continue to gain momentum across the global enterprise market. These accomplishments also validated our mission to deliver secure, seamless application connectivity across hybrid environments. “We’re honored to be recognized for empowering our customers to move faster and stay secure,” an AlgoSec spokesperson said, when discussing what the SC Award means to us. Indeed, being named Best Security Company came on the heels of some impressive company growth metrics – over 2,200 organizations now trust AlgoSec for their security policy management needs, and we saw 14% customer growth over the past year. The SC Award judges also noted that we command roughly 32% of the security policy management market share , highlighting AlgoSec’s leadership in this space. For me personally, seeing our work celebrated at RSAC 2025 was exhilarating. It wasn’t just about trophies; it was about validation from the community that the path we chose – focusing on application-centric, hybrid-cloud security – is the right one. Q2 ended with our trophy cabinet a bit fuller and our resolve stronger than ever to keep raising the bar. Q3 – Accelerating growth and fostering community The third quarter saw our innovations bear fruit in the market and our community initiatives take center stage. Coming out of the big wins of Q2, we maintained that momentum through the summer by executing on our strategies and engaging deeply with customers and partners. Q3 was about scaling up – both in terms of business impact and thought leadership outreach. Surging adoption and business growth: By mid-year, the impact of our new platform and solutions was clear in the numbers . In fact, we recorded a 36% year-over-year increase in new annual recurring revenue (ARR) in the first half of 2025 , driven largely by strong adoption of the AlgoSec Horizon platform. Our existing customers stayed with us as well – we maintained a gross dollar retention rate above 90%, a metric that speaks to the tangible value organizations are getting from our products. One anecdote that sticks with me is a story from a major U.S. financial institution: after deploying Horizon, they discovered 1,800 previously unknown applications and their connectivity requirements within the first two weeks . That kind of visibility – uncovering what was once shadow IT – is a game-changer for risk reduction. It proved that our focus on hybrid cloud security and intelligent automation is solving real problems. Equally rewarding was the feedback from customers. By Q3, AlgoSec was sustaining an average rating of 4.5 stars on Gartner Peer Insights , with users praising our platform’s depth and ease of use. We’ve also consistently ranked at the top of our category on peer review sites like G2 and PeerSpot, reflecting the positive outcomes our users are achieving . This convergence of market growth and customer satisfaction in Q3 affirmed that our application-centric approach is resonating strongly. Extending thought leadership through strategic research: Our growth in Q3 wasn’t just reflected in numbers—it also showed in how we’re shaping the security conversation. One standout was the publication of the Security Convergence eBook , developed in partnership with ESG. This research-backed guide addressed the operational and strategic challenges of aligning application, network, and cloud security. It offered actionable insights for enterprises navigating the intersection of security domains, a challenge we consistently hear about from our customers. The eBook resonated with CISOs and security leaders tasked with unifying fragmented processes under growing compliance and performance pressures. It reaffirmed AlgoSec’s unique position—not just as a solution provider, but as a partner helping drive clarity and convergence in the face of growing complexity. Community engagement and knowledge sharing : Even as we grew, we never lost sight of the importance of community and education. In September, we launched the AlgoSec Horizon Tour , a roadshow of interactive sessions across EMEA and the U.S. aimed at sharing best practices in secure application connectivity. These workshops gave enterprise security teams a hands-on look at Horizon’s capabilities and provided a forum for us to hear feedback directly from users. The tour culminated in our annual AlgoSummit 2025 – a virtual conference we hosted on September 30th that brought together customers, partners, and industry experts. If I had to choose a proud moment from Q3, AlgoSummit 2025 would be high on the list. We facilitated deep-dive discussions on zero trust architecture , cloud security, and the future of network policy automation. It was inspiring to see our community openly exchange ideas and solutions. This summit wasn’t just a company event; it felt like an industry think-tank. It reinforced AlgoSec’s role as a trusted advisor in the field of network security, not just a product vendor. By the end of Q3, we had strengthened the bonds with our user community and showcased that as networks evolve, we’re evolving right alongside our customers – providing guidance, platform innovations, and an open ear to their needs. Recognition of customer success: On a more personal note, Q3 also brought moments that reminded us why we do what we do. I recall one customer review that particularly struck me, where a network security manager described how AlgoSec became indispensable as their organization embraced zero trust. “As we aspire to achieve zero-trust… we need tools like AlgoSec to assist us in the journey because most application owners do not know what access is needed. This tool helps them learn what needs to be implemented to reduce the attack surface,” he noted. Hearing directly from customers about how we’re helping them reduce risk and implement zero trust principles is incredibly motivating. It underscores that behind the growth statistics are real organizations becoming safer and more agile, powered by our solutions. This customer-centric ethos carried us through Q3 and into the final stretch of the year. Q4 – Culminating achievements and setting the stage for what’s next As the year drew to a close, AlgoSec showed no signs of slowing down. In fact, Q4 was about finishing strong and preparing for the future. We used the final quarter to expand our solution capabilities, help customers navigate new security paradigms, and celebrate the capstone of several achievements. It’s been a period of tying up 2025’s narrative threads and pointing our compass toward 2026. Expanding zero-trust and cloud security initiatives: In Q4, we doubled down on helping customers realize Zero Trust Architecture across their increasingly complex environments. Building on the micro-segmentation and application dependency mapping capabilities of our platform, we introduced new workflows to streamline zero-trust policy adoption. Our approach has been to make zero trust practical – ensuring that as enterprises segment their networks, they maintain clear visibility into application flows and can automate rule changes without fear of breaking things. We also expanded integrations with cloud platforms, recognizing that hybrid cloud deployments require consistent enforcement of zero-trust principles. The goal is simple: only allow what’s necessary. As one of our customers at NCR put it, “we need tools like AlgoSec… because most application owners do not know what access is needed. This tool helps them learn what needs to be implemented to reduce the attack surface.” That insight from the field echoes in our Q4 product enhancements – we focused on features that help identify and tighten overly permissive access, be it on-prem or in the cloud. Additionally, we kept an eye on emerging regulations and frameworks. With new security compliance requirements on the horizon, we ensured our solutions can automate audits and segmentation policies to keep our customers one step ahead. In short, Q4 was about reinforcing our commitment to hybrid cloud security and zero trust, so that our users can enter 2026 with confidence in their security posture. Even as 2025 ends, the wave of recognition we’ve ridden continues into Q4. I’m thrilled to share that in November, AlgoSec was named a “Trailblazing” company in Network Security and Management as part of the 2025 Top InfoSec Innovator Awards . This honor, bestowed by Cyber Defense Magazine’s panel of judges, places us among a select group of cybersecurity companies driving innovation and shaping the future of the industry. It’s a testament to our team’s hard work and our forward-thinking roadmap. Looking ahead to 2026 Reflecting on 2025, it’s clear that this year has been t ransformationa l for AlgoSec. We innovated boldly, earned trust widely, and solidified our position as the go-to partner for enterprises seeking secure, agile connectivity. The awards and recognitions were wonderful highlights – they energize us – but what truly drives our pride is knowing we helped organizations around the world accelerate their business securely . The foundations we laid this year in areas like zero trust architecture, hybrid cloud security, and intelligent policy automation have set us up for an even more impactful 2026. As we turn toward 2026, our vision is sharper than ever. We will continue to advance our platform – expect even more AI-driven insights, broader cloud integrations, and features that make managing network security policies in complex environments simpler than ever. We’ll also keep championing thought leadership through research and community engagement, because educating the market is part of our DNA. The threat landscape will undoubtedly evolve in 2026, but we plan to stay ahead of the curve , helping our customers navigate whatever comes next with confidence and clarity. On a personal note, I am incredibly grateful for the dedication of our team and the unwavering support of our AlgoSec community. It’s your feedback and your challenges that inspire our innovations. This year we’ve seen what we can achieve together – from launching Horizon to embracing zero trust, from winning awards to solving tough problems on the ground. 2025 has been a chapter of leadership and growth in AlgoSec’s story. Now we set our sights on writing the next chapter. With the momentum at our backs and our mission guiding us, we step into 2026 ready to continue redefining what’s possible in secure application connectivity. Here’s to another year of innovation, collaboration, and success on the horizon! Thank you for being part of our 2025 journey. We’re excited for what’s to come – and we’ll be sure to keep you posted every step of the way. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- The Big Collection Of FIREWALL MANAGEMENT TIPS - AlgoSec
The Big Collection Of FIREWALL MANAGEMENT TIPS Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec for AWS Security Management in the Hybrid Cloud - AlgoSec
AlgoSec for AWS Security Management in the Hybrid Cloud Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- LA SOLUCIÓN DE GESTIÓN DE SEGURIDAD - AlgoSec
LA SOLUCIÓN DE GESTIÓN DE SEGURIDAD Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Cisco and AlgoSec Partner solution brief- Better together for intelligent automation - AlgoSec
Cisco and AlgoSec Partner solution brief- Better together for intelligent automation Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Assessing the Value of Network Segmentation from a Business Application Perspective - AlgoSec
Assessing the Value of Network Segmentation from a Business Application Perspective Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Top vulnerability management tools
Review top vulnerability management tools for 2025, including suggested applications and selection criteria, and learn how to minimize exposure to security threats. It covers network vulnerability tools, automated vulnerability management systems, open source vulnerability scanners, continuous monitoring solutions, and patch management and vulnerability scanning tools. The number of cyberattacks keeps increasing, and their associated cost shows no sign of slowing down. The global average cost of a data breach now stands at $4.4 million, according to IBM’s Cost of a Data Breach Report 2025. Meanwhile, the Verizon 2025 Data Breach Investigation Report shows ransomware attacks caused 44% of all system-intrusion breaches. These data points underline that organizations must establish robust security measures early on to prevent future problems from occurring. This guide provides essential information about vulnerability management today through its presentation of top vulnerability management tools on the market for 2025. Top vulnerability management tools Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Vulnerability Management Tools for 2025: What to Use and Why Review top vulnerability management tools for 2025, including suggested applications and selection criteria, and learn how to minimize exposure to security threats. It covers network vulnerability tools, automated vulnerability management systems, open source vulnerability scanners, continuous monitoring solutions, and patch management and vulnerability scanning tools. The number of cyberattacks keeps increasing, and their associated cost shows no sign of slowing down. The global average cost of a data breach now stands at $4.4 million, according to IBM’s Cost of a Data Breach Report 2025 . Meanwhile, the Verizon 2025 Data Breach Investigation Report shows ransomware attacks caused 44% of all system-intrusion breaches. These data points underline that organizations must establish robust security measures early on to prevent future problems from occurring. This guide provides essential information about vulnerability management today through its presentation of top vulnerability management tools on the market for 2025. What Is Vulnerability Management? Vulnerability management is a process of ongoing asset discovery to locate weaknesses, which are then evaluated according to their risk level and business value. This approach enables fast problem-solving and generates clear, easy-to-understand data for stakeholders. Key Features of Modern Vulnerability Management Tools Organizations require a vulnerability management platform that protects their data centers, multiple cloud services, and SaaS platforms through analytical and automated features. To find the right vulnerability management tool for your environment, you need to assess both network vulnerability tools and application-aware engines. What Is Asset Discovery in Vulnerability Management and Why Does It Matter? Asset discovery in vulnerability management requires organizations to identify all hardware and software components within their network infrastructure. This first step is critical, as it allows companies to understand their security vulnerabilities and create appropriate protection plans. There is no safeguarding the invisible. This is why your chosen toolset must automatically detect all endpoints, servers, containers, applications, and internet-accessible assets that exist within both cloud and on-premises environments. A unified inventory system that integrates multiple data sources enables vulnerability scans to detect more assets. This, in turn, minimizes the number of detection and identification issues that occur when assets exist outside of your system. Why Is Continuous Vulnerability Monitoring Essential in 2025? Vulnerability monitoring will continue to be necessary in 2025 and beyond because the method of point-in-time assessments does not identify changing risk factors that are fast-evolving. The market-leading security tools employ business-relevant threat intelligence to help teams detect weaknesses that create risk. They also provide documentation, which is key. Auditors, engineers, and executives require clear documentation to demonstrate how continuous vulnerability monitoring leads to correct change control procedures and proper prioritization. A key aspect of automated vulnerability management is the combination of vulnerability scanning with patch management to maximize system defenses. Automated Vulnerability Management: How Patch Management and Vulnerability Scanning Work Together Traditionally, organizations use automated vulnerability management to decrease MTTR by creating service tickets/change requests and deploying secure patch solutions. However, organizations can automatically respond to detected threats if vulnerability scanning systems maintain a close link to patch management systems. The practice of automated vulnerability management integrates the steps of patch approval with rollout and verification, creating a single operational workflow. This approach provides an automation-based vulnerability management process that operates during scheduled maintenance periods. At the same time, a solution’s documentation system produces results for both auditable and transparent outcome-tracking. Reporting and Analytics for Effective Vulnerability Management Programs Custom dashboards aren’t just for engineers. Executives rely on them as well. A tool’s reporting system needs to deliver exposure trend information alongside SLA performance data and straightforward resolution paths. Leading platforms display CVEs through business-oriented visualizations that show how attacks could affect specific applications. Comparing Network Vulnerability Tools and Open Source Vulnerability Scanners Enterprise-grade scalability in commercial network vulnerability tools comes from: Asset correlation Risk-based prioritization ITSM/CMDB integrations Advanced reporting Network vulnerability tools support broad discovery operations and program governance, while open-source scanners deliver fast and targeted vulnerability assessments for development pipeline testing. Open-source scanners enable teams to perform fast PR reviews and test new security policies within CI/CD environments. The validation process enables these policies to become active in enterprise-wide scans, which network vulnerability tools handle. What Are the Top 10 Vulnerability Management Tools? The following summary of these 10 solutions’ key characteristics and relevant applications will help you match the right vulnerability management tool to your specific infrastructure. Tool Key Highlights Best For Tenable Nessus Expert Deep-dive scanning for hosts & web apps, plus basic cloud/external checks; prioritization with EPSS/CVSS/VPR and 450+ templates Teams requiring thorough, traditional scanning with some modern additions Rapid7 InsightVM Prioritizes fixes based on real-world attacker behavior; great for team workflows Enterprises wanting to focus on the most likely threats and streamline IT tasks Qualys VMDR An all-in-one platform for discovery, prioritization, and patching Large organizations looking for a single, integrated tool for the whole process Wiz Agentless cloud security that maps out potential attack paths Cloud-first companies that need to see the bigger picture of their cloud risk Prisma Cloud Secures the entire development lifecycle (coding to deployment) Dev-heavy teams needing to align security across the entire build process CrowdStrike Falcon Adds real-time vulnerability scanning to CrowdStrike's endpoint protection platform Companies already using CrowdStrike for endpoint security Microsoft Defender Vulnerability Management Native vulnerability management that's deeply integrated into the Microsoft ecosystem Organizations heavily invested in Microsoft products Orca Security Agentless scanning that pinpoints which vulnerabilities are actually exploitable Multi-cloud teams who want to quickly focus on the most critical, reachable risks Arctic Wolf Managed Risk Managed service with a concierge team that runs your vulnerability program for you Resource-constrained teams that want experts to handle vulnerability management Cisco Vulnerability Management (formerly Kenna Security) Uses data science to predict threats and suggest the most efficient fixes Organizations using multiple scanners that need a smart way to prioritize all the data Evaluating Vulnerability Management Solutions for Enterprises Enterprises need vulnerability management solutions that : Integrate with change workflows and CMDBs Expose robust APIs for automation and role‑based access controls Provide localized reporting and support delegated administration for global teams AlgoSec: A Leader in Vulnerability Management Solutions for Enterprises Getting a list of vulnerabilities from a scanner is just the first step. AlgoSec helps users understand and take action in the following ways: The platform provides context for all vulnerabilities in your system. Connect your current scanners to AlgoSec so it can identify and match its results to your operational business applications. See which specific services are affected by a server defect—not simply that you have a server problem. AlgoSec automates fixes without breaking things. The system not only produces automatic remediation rules, but its validation process verifies your changes to stop any accidental disruption of business operations. It helps you prioritize smarter. Develop a task list to match your organizational needs, allowing you to concentrate on the threats that endanger your essential applications the most. This saves time and eliminates unnecessary information. Choosing the right tool means moving beyond a simple list of flaws to understanding their real-world business impact. A context-aware approach is the key to managing risk effectively and ensuring your remediation efforts are both safe and efficient. Ready to see how an application-centric approach can boost your vulnerability management program? Learn more about AlgoSec and request a demo today! Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- Increasing Cisco ACI adoption with AlgoSec - AlgoSec
Increasing Cisco ACI adoption with AlgoSec Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Errare humanum est
Nick Ellsmore is an Australian cybersecurity professional whose thoughts on the future of cybersecurity are always insightful. Having a... Cloud Security Errare humanum est Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 11/25/21 Published Nick Ellsmore is an Australian cybersecurity professional whose thoughts on the future of cybersecurity are always insightful. Having a deep respect for Nick, I really enjoyed listening to his latest podcast “Episode 79 Making the cyber sector redundant with Nick Ellsmore” . As Nick opened the door to debate on “all the mildly controversial views” he has put forward in the podcast, I decided to take a stab at a couple of points made by Nick. For some mysterious reason, these points have touched my nerve. So, here we go. Nick: The cybersecurity industry, we spent so long trying to get people to listen to us and take the issue seriously, you know, we’re now getting that, you know. Are the businesses really responding because we were trying to get people to listen to us? Let me rephrase this question. Are the businesses really spending more on cybersecurity because we were trying to get people to listen to us? The “cynical me” tells me No. Businesses are spending more on cybersecurity because they are losing more due to cyber incidents. It’s not the number of incidents; it’s their impact that is increasingly becoming devastating. Over the last ten years, there were plenty of front-page headliners that shattered even seemingly unshakable businesses and government bodies. Think of Target attack in 2013, the Bank of Bangladesh heist in 2016, Equifax breach in 2017, SolarWinds hack in 2020 .. the list goes on. We all know how Uber tried to bribe attackers to sweep the stolen customer data under the rug. But how many companies have succeeded in doing so without being caught? How many cyber incidents have never been disclosed? These headliners don’t stop. Each of them is another reputational blow, impacted stock options, rolled heads, stressed-out PR teams trying to play down the issue, knee-jerk reaction to acquire snake-oil-selling startups, etc. We’re not even talking about skewed election results (a topic for another discussion). Each one of them comes at a considerable cost. So no wonder many geniuses now realise that spending on cybersecurity can actually mitigate those risks. It’s not our perseverance that finally started paying off. It’s their pockets that started hurting. Nick: I think it’s important that we don’t lose sight of the fact that this is actually a bad thing to have to spend money on. Like, the reason that we’re doing this is not healthy. .. no one gets up in the morning and says, wow, I can’t wait to, you know, put better locks on my doors. It’s not the locks we sell. We sell gym membership. We want people to do something now to stop bad things from happening in the future. It’s a concept of hygiene, insurance, prevention, health checks. People are free not to pursue these steps, and run their business the way they used to .. until they get hacked, get into the front page, wondering first “Why me?” and then appointing a scapegoat. Nick: And so I think we need to remember that, in a sense, our job is to create the entire redundancy of this sector. Like, if we actually do our job, well, then we all have to go and do something else, because security is no longer an issue. It won’t happen due to 2 main reasons. Émile Durkheim believed in a “society of saints”. Unfortunately, it is a utopia. Greed, hunger, jealousy, poverty are the never-ending satellites of the human race that will constantly fuel crime. Some of them are induced by wars, some — by corrupt regimes, some — by sanctions, some — by imperfect laws. But in the end — there will always be Haves and Have Nots, and therefore, fundamental inequality. And that will feed crime. “Errare humanum est” , Seneca. To err is human. Because of human errors, there will always be vulnerabilities in code. Because of human nature (and as its derivative, geopolitical or religious tension, domination, competition, nationalism, fight for resources), there will always be people willing to and capable of exploiting those vulnerabilities. Mix those two ingredients — and you get a perfect recipe for cybercrime. Multiply that with never-ending computerisation, automation, digital transformation, and you get a constantly growing attack surface. No matter how well we do our job, we can only control cybercrime and keep the lid on it, but we can’t eradicate it. Thinking we could would be utopic. Another important consideration here is budget constraints. Building proper security is never fun — it’s a tedious process that burns cash but produces no tangible outcome. Imagine a project with an allocated budget B to build a product P with a feature set F, in a timeframe T. Quite often, such a project will be underfinanced, potentially leading to a poor choice of coders, overcommitted promises, unrealistic expectations. Eventually leading to this (oldie, but goldie): Add cybersecurity to this picture, and you’ll get an extra step that seemingly complicates everything even further: The project investors will undoubtedly question why that extra step was needed. Is there a new feature that no one else has? Is there a unique solution to an old problem? None of that? Then what’s the justification for such over-complication? Planning for proper cybersecurity built-in is often perceived as FUD. If it’s not tangible, why do we need it? Customers won’t see it. No one will see it. Scary stories in the press? Nah, that’ll never happen to us. In some way, extra budgeting for cybersecurity is anti-capitalistic in nature. It increases the product cost and, therefore, its price, making it less competitive. It defeats the purpose of outsourcing product development, often making outsourcing impossible. From the business point of view, putting “Sec” into “DevOps” does not make sense. That’s Ok. No need. .. until it all gloriously hits the fan, and then we go back to STEP 1. Then, maybe, just maybe, the customer will say, “If we have budgeted for that extra step, then maybe we would have been better off”. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Defining & Enforcing a Micro-segmentation Strategy - AlgoSec
Defining & Enforcing a Micro-segmentation Strategy Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue
- AlgoSec | Removing insecure protocols In networks
Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to... Risk Management and Vulnerabilities Removing insecure protocols In networks Matthew Pascucci 2 min read Matthew Pascucci Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 7/15/14 Published Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to talk about. They’re the protocols that we don’t mention in a security audit or to other people in the industry for fear that we’ll be publicly embarrassed. Yes, I’m talking about cleartext protocols which are running rampant across many networks. They’re in place because they work, and they work well, so no one has had a reason to upgrade them. Why upgrade something if it’s working right? Wrong. These protocols need to go the way of records, 8-tracks and cassettes (many of these protocols were fittingly developed during the same era). You’re putting your business and data at serious risk by running these insecure protocols. There are many insecure protocols that are exposing your data in cleartext, but let’s focus on the three most widely used ones: FTP, Telnet and SNMP. FTP (File Transfer Protocol) This is by far the most popular of the insecure protocols in use today. It’s the king of all cleartext protocols and one that needs to be smitten from your network before it’s too late. The problem with FTP is that all authentication is done in cleartext which leaves little room for the security of your data. To put things into perspective, FTP was first released in 1971, almost 45 years ago. In 1971 the price of gas was 40 cents a gallon, Disneyland had just opened and a company called FedEx was established. People, this was a long time ago. You need to migrate from FTP and start using an updated and more secure method for file transfers, such as HTTPS, SFTP or FTPS. These three protocols use encryption on the wire and during authentication to secure the transfer of files and login. Telnet If FTP is the king of all insecure file transfer protocols then telnet is supreme ruler of all cleartext network terminal protocols. Just like FTP, telnet was one of the first protocols that allowed you to remotely administer equipment. It became the defacto standard until it was discovered that it passes authentication using cleartext. At this point you need to hunt down all equipment that is still running telnet and replace it with SSH, which uses encryption to protect authentication and data transfer. This shouldn’t be a huge change unless your gear cannot support SSH. Many appliances or networking gear running telnet will either need the service enabled or the OS upgraded. If both of these options are not appropriate, you need to get new equipment, case closed. I know money is an issue at times, but if you’re running a 45 year old protocol on your network with the inability to update it, you need to rethink your priorities. The last thing you want is an attacker gaining control of your network via telnet. Its game over at this point. SNMP (Simple Network Management Protocol) This is one of those sneaky protocols that you don’t think is going to rear its ugly head and bite you, but it can! escortdate escorts . There are multiple versions of SNMP, and you need to be particularly careful with versions 1 and 2. For those not familiar with SNMP, it’s a protocol that enables the management and monitoring of remote systems. Once again, the strings can be sent via cleartext, and if you have access to these credentials you can connect to the system and start gaining a foothold on the network, including managing, applying new configurations or gaining in-depth monitoring details of the network. In short, it a great help for attackers if they can get hold of these credentials. Luckily version 3.0 of SNMP has enhanced security that protects you from these types of attacks. So you must review your network and make sure that SNMP v1 and v2 are not being used. These are just three of the more popular but insecure protocols that are still in heavy use across many networks today. By performing an audit of your firewalls and systems to identify these protocols, preferably using an automated tool such as AlgoSec Firewall Analyzer , you should be able to pretty quickly create a list of these protocols in use across your network. It’s also important to proactively analyze every change to your firewall policy (again preferably with an automated tool for security change management ) to make sure no one introduces insecure protocol access without proper visibility and approval. Finally, don’t feel bad telling a vendor or client that you won’t send data using these protocols. If they’re making you use them, there’s a good chance that there are other security issues going on in their network that you should be concerned about. It’s time to get rid of these protocols. They’ve had their usefulness, but the time has come for them to be sunset for good. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call
- Enhancing Zero Trust WP - AlgoSec
Enhancing Zero Trust WP Download PDF Schedule time with one of our experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue


