Blog


From tackling disconnected applications apps to enhancing security automation, our blogs guide you through the evolving landscape of cybersecurity, ensuring your enterprise stays ahead with practical advice, innovation stories, and the latest trends.
Cerby-Wifi-logo
Cerby-megaphone-logo
Cerby-messages-logo
Cerby-Blog-Giro
Cerby blog
| Nov 7, 2023
Alameda, CA – November 7, 2023 –Cerby, the comprehensive access management platform for nonstandard applications, today announced its newest report, Threat Briefing: Social Media Security and Elections Volume II, a year-over-year analysis and research...
Company, Press release
Cerby blog
| Oct 3, 2023
ALAMEDA, CA – October 3, 2023 – Cerby, the comprehensive access management platform for nonstandard applications, today announced a partnership with the World’s Identity Company, Okta. Cerby's partnership with Okta expands the reach of Okta's...
Company, Partners
Cerby blog
| Aug 22, 2023
Led by Two Sigma Ventures with significant participation from Outpost Ventures.
Company, Press release
Cerby blog
| Aug 22, 2023
Cerby raises $17M to mitigate the risks of nonstandard applications. Get a demo. What if you could lower your risk of breach by upwards of 15% without adding a single person to your security team?
Company, Press release
Cerby blog
| Aug 9, 2023
As the temperature rises and summer starts to fade away, children eagerly head back to school while others plead with their parents for a few more days of fun in the sun. Meanwhile, our team is busy finalizing plans to meet you at some exciting events...
Company
Cerby blog
| Jul 18, 2023
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero Trust architecture — creating policy and monitoring and maintaining the environment.
Security, Zero Trust
Cerby blog
| May 25, 2023
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second and third steps in implementing Zero Trust architecture — mapping transaction flows and defining the...
Security, Zero Trust
Cerby blog
| Apr 24, 2023
Unearthing the truth behind nonfederated applications through independent research.
Industry insights