If you’re working with security, you need to know about microsegmentation. Joe Onisick has a great primer that you want to read.
How can we increase diversity and highlight the struggles and challenges that people face in every day life? Zoe Rose and Ian-Thornton Trump have some great ideas that need to be discussed in this post.
Bruno Wollmann looks at how Cisco Defense Orchestrator offers some overdue respite to beleaguered security operations teams as well as comfort to CISOs, CIOs and CEOs trying to keep their organizations out of the news. If you are struggling with configuration management, device upgrades and overall security policy management, CDO may help end those struggles.
Meraki may be the last name you think of when it comes to security cameras. But the engineering effort put into their line of on-premises security devices is very impressive. Tom Hollingsworth takes a look at a couple of their new offerings and gives his perspective on how Meraki sees the world.
Can SD-WAN innovate through software alone? Or can custom hardware ASICs make the difference in performance? Tom Hollingsworth takes a look at the Fortinet presentation from Networking Field Day and discusses how ASICs may be the key to Foritinet finding their ante in the SD-WAN market.
How can you protect your virtual workloads in the cloud? Or your east/west traffic flows between hosts behind a perimeter firewall? Tom Hollingsworth talked to ShieldX about how they’re able to microsegement the traffic flows between your virtual workloads.
RSA 2019 is coming up fast! Tom Hollingsworth takes a quick look at why RSA is so important as well as understanding some of the areas of security that are in focus this year and who you should be talking to in order to learn more about them.
It’s become a media narrative that there is a “talent gap” in cybersecurity. The story goes that there are plenty of good paying jobs, but not enough qualified people to do them. On the face of it, there seem to be good reasons. The spate of high profile data leaks and hacks have made security a front and center concern for organizations of all sizes. As the sophistication of these attacks increase, it makes sense that the number of jobs needed would also increases. But Ben Tomhave can’t stand this narrative. He makes the case that this talent gap is actually symptomatic of organizational dysfunction.
The current US government shutdown is a political problem, but one that has real world security implications. We touched on this during the Gestalt IT Rundown last week, but Brian Krebs has an in-depth breakdown of is actually happening behind the scenes.
Managing infrastructure is hard enough. But in today’s world of cloud computing it can be tough to manage constructs that live for seconds instead of persisting. How can you keep a handle on it all. Confidentially, the best way is with Aporeto. Tom Hollingsworth discusses the power of identity management for workloads in this post.