Threat protection
A port scan is a networking technique that determines what ports on a device are open. Cybercriminals also use port scanning to identify targets and assess defenses on a network.
8
Min read
ZTNA
Work-from-home trends carry inherent cybersecurity risks that put remote employees and their companies at risk of scams and data breaches. Find out about 8 cybersecurity best practices to keep yourself safe.
20
Cybersecurity risk management is a continuous process of analyzing cyber threats and deploying countermeasures. Read all about how to reduce your company’s cyber risk.
11
Release News
GoodAccess supports SCIM for user access provisioning and synchronization with your IdP. User Groups enable you to manage users and their access rights as one entity.
3
Release news
Recent additions to GoodAccess improve device observability and user experience. Find out what kind of information GoodAccess provides and other improvements we’ve made.
Threat Protection
Executive phishing, aka whaling, is a sophisticated form of spear-phishing that targets high-ranking company executives. Find out how to spot and protect your business from whaling attacks.
16