Edge computing and IoT are hot topics in today’s market. But not all edge computing solutions are built for the future. Tom Hollingsworth takes a look at a new startup, Edgeworx, and what they’re doing to make a big splash at the edge.
Tom Hollingsworth takes a look at the growing world of microsegmentation and how smaller companies like Guardicore are jumping at the chance to work with users to secure their applications and systems and ensure that traffic is only going where it is supposed to go.
Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
As a long time Have I Been Pwned fan, I like to keep up with what Troy Hunt is saying about security. In this post, he makes the argument that publicly shaming bad corporate security is a net positive. This kind of direct public pressure, either from journalists, security researchers, or anyone with social reach, […]
With Cisco Live US happening this week in Orlando, we decided to share a throwback episode featuring Rob Rodgers and Mils Swart of Skyport Systems. Skyport was recently acquired by Cisco in February. It’ll be interesting to see how Cisco uses this talent to address the security concerns raised in this episode.
Managing access control lists on firewalls is a time consuming affair that often leads to significant frustration. There needs to be an easy way of making sure that these constructs are successfully maintained. Tom Hollingsworth looks at a new SolarWinds tool from Tech Field Day 16 and how Network Insight for Cisco ASA has features to help you control your access lists.
Gmail doesn’t distinguish if you put extra dots in your email. Netflix does. Oh, not a problem you say? Bruce Schneier shows how two mundane data practices can come together to create a security exploit.
In this edition of Gestalt News:
– We talk to Jordan Martin and get his IT Origin story
– Our First Five series tackles Simple Security
– The On-Premise IT Roundtable discuss the language that most pains them in IT.
Do you have full confidence in your security monitoring solution? It would appear that no one does based on a recent report. But ExtraHop is hoping to change that with a new product called Reveal(x) that combines their award-winning network monitoring solutions with a security focus to help you decipher what your infrastructure may be hiding.
Where do you start when a tech topic gets too deep? First Five! Our new series takes a step back and introduces a new tech topic with five things you want to know. It’s your quick and easy fix to understand the technological fundamentals all around us. For our debut, First Five breaks down the Cloud.