<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1838014323211965&amp;ev=PageView&amp;noscript=1">

Blogs



Your go-to resource for navigating the challenges of disconnected applications and enhancing security automation. Dive into actionable advice, innovative solutions, and the latest cybersecurity trends to keep your enterprise secure and ahead of the curve.

Cerby-Wifi-logo
Cerby-megaphone-logo
Cerby-messages-logo
Cerby-Blog-Giro
Cerby blog
| Nov 10, 2023
In the digital age, social media platforms have become the epicenters of political discourse, making their security a matter of national importance, especially as the US gears up for the November 2023 elections. Our latest research sheds light on the...
Company
Cerby blog
| Nov 7, 2023
Alameda, CA – November 7, 2023 –Cerby, the comprehensive access management platform for nonstandard applications, today announced its newest report, Threat Briefing: Social Media Security and Elections Volume II, a year-over-year analysis and research...
Company, Press release
Cerby blog
| Oct 3, 2023
ALAMEDA, CA – October 3, 2023 – Cerby, the comprehensive access management platform for nonstandard applications, today announced a partnership with the World’s Identity Company, Okta. Cerby's partnership with Okta expands the reach of Okta's...
Company, Partners
Cerby blog
| Aug 22, 2023
Led by Two Sigma Ventures with significant participation from Outpost Ventures.
Company, Press release
Cerby blog
| Aug 22, 2023
Cerby raises $17M to mitigate the risks of nonstandard applications. Get a demo. What if you could lower your risk of breach by upwards of 15% without adding a single person to your security team?
Company, Press release
Cerby blog
| Aug 9, 2023
As the temperature rises and summer starts to fade away, children eagerly head back to school while others plead with their parents for a few more days of fun in the sun. Meanwhile, our team is busy finalizing plans to meet you at some exciting events...
Company
Cerby blog
| Jul 18, 2023
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero Trust architecture — creating policy and monitoring and maintaining the environment.
Security, Zero Trust
Cerby blog
| May 25, 2023
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second and third steps in implementing Zero Trust architecture — mapping transaction flows and defining the...
Security, Zero Trust