Aviatrix Blog

Post Tag: Salt Typhoon

Recent

Cloud-Native Network Security (CNNS): The New Battleground for Modern Threats

Cloud-Native Network Security (CNNS): The New Battleground for Modern Threats

Modern threats exploit cloud networks. Learn how to implement cloud-native network security with CISA practices like segmentation and traffic encryption.

Read More >
Photo of a locked door

The Egress Security Gap: How Silk Typhoon and Other Threats Exploit Your Network’s Backdoor

Egress security is critical. Here's how to protect your network from APTs like Silk Typhoon as well as CSP changes.

Read More >
Graphic with text: Monthly Must Reads

ICYMI: 5 Cloud Network Security Must-Reads for February 2025

Huge investments in AI, why enterprises fail at finops, and the ongoing threat of the state-sponsored Salt Typhoon campaign

Read More >
Graphic with text: Monthly Must Reads

ICYMI: 5 Cloud Network Security Must-Reads for January 2025

Top reads for January include updates to the Salt Typhoon hack's victim list, ransomware that abuses an AWS feature, and what CISOs should know about DORA regulations.

Read More >