Yotam Gutman
16.3.2026
Six years after the shift to remote work, the traditional corporate security perimeter has dissolved. Explore how legacy remote access tools like VPNs have become prime targets for attackers
12.3.2026
The Ivanti saga proves the "Trusted Perimeter" model is dead. Read our post-mortem on the systemic failures of traditional VPNs and discover how Zeroport’s non-IP secured remote connection offers a safer alternative to VPNs
9.3.2026
In late December 2025, A coordinated cyberattack targeted the Polish power grid, specifically focusing on Distributed Energy Resources. This blog and white paper explain the attack and subsequent shift in defence tactics.
Lavi Friedman
3/3/2026
AI agents are everywhere — from OpenClaw to ChatGPT — promising to manage your life locally while keeping your data safe. But look closer, and most of them still rely on a cloud “brain.” That means your sensitive data leaves your perimeter.
26.2.2026
Remote Access and Admin tools leave the door open for hacker to exploit your organization
Joseph Gertz
We are witnessing a fundamental re-mapping of the cybersecurity stack. Commercial AI is making once-essential security software redundant, but some solutions are more resilient than others.
Zeroport blog
14-01-2026
There comes a special moment in every startup life- the moment it emerges from stealth. Today- it’s Zeroport’s turn.
Yotam Gurtman
29-12-2025
Remote work has amplified insider threats by extending VPN-based access beyond the perimeter. When credentials become the only gate, disgruntled or compromised insiders can exfiltrate data at scale—turning trusted access into a breach path.
24-12-2025
Remote hiring has become a security boundary. North Korean IT workers exploit stolen identities, VPNs, and laptop farms to gain trusted access, steal data, and extort companies—turning VPN-based remote work into a scalable attack surface.
20-12-2025
VPNs are no longer breached only through vulnerabilities, but through stolen credentials sold and reused at scale. Once attackers log in, they blend in, move laterally, deploy ransomware, and exfiltrate data.
16-12-2025
Water utilities are increasingly targeted through insecure remote access. Real-world attacks reveal how VPNs and remote tools expose OT systems, highlighting the need for hardware-enforced, non-IP protection.
25-11-2025
In 2025, VPNs became prime attack targets. While adoption surged, attackers shifted from exploiting VPN vulnerabilities to abusing stolen credentials at scale,turning remote access into a high-impact entry point for ransomware.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.