Stopping intrusions in air gapped systems isn’t always easy. But what if you had an agent that could stop these attacks through catching suspicious system behavior? Without the need to be connected to the Internet? Tom Hollingsworth looks at a solution from Nyotron that can help you protect yourself.
What does the view from the top look like? Is it expansive? Or do you lose the details? Tom Hollingsworth reviews VIAVI Observer Apex and how their software can help you see both the vision of your entire organization and the details you need to ensure that you don’t miss any issues.
If you’re working with security, you need to know about microsegmentation. Joe Onisick has a great primer that you want to read.
How can we increase diversity and highlight the struggles and challenges that people face in every day life? Zoe Rose and Ian-Thornton Trump have some great ideas that need to be discussed in this post.
Bruno Wollmann looks at how Cisco Defense Orchestrator offers some overdue respite to beleaguered security operations teams as well as comfort to CISOs, CIOs and CEOs trying to keep their organizations out of the news. If you are struggling with configuration management, device upgrades and overall security policy management, CDO may help end those struggles.
Meraki may be the last name you think of when it comes to security cameras. But the engineering effort put into their line of on-premises security devices is very impressive. Tom Hollingsworth takes a look at a couple of their new offerings and gives his perspective on how Meraki sees the world.
Can SD-WAN innovate through software alone? Or can custom hardware ASICs make the difference in performance? Tom Hollingsworth takes a look at the Fortinet presentation from Networking Field Day and discusses how ASICs may be the key to Foritinet finding their ante in the SD-WAN market.
How can you protect your virtual workloads in the cloud? Or your east/west traffic flows between hosts behind a perimeter firewall? Tom Hollingsworth talked to ShieldX about how they’re able to microsegement the traffic flows between your virtual workloads.
RSA 2019 is coming up fast! Tom Hollingsworth takes a quick look at why RSA is so important as well as understanding some of the areas of security that are in focus this year and who you should be talking to in order to learn more about them.
It’s become a media narrative that there is a “talent gap” in cybersecurity. The story goes that there are plenty of good paying jobs, but not enough qualified people to do them. On the face of it, there seem to be good reasons. The spate of high profile data leaks and hacks have made security a front and center concern for organizations of all sizes. As the sophistication of these attacks increase, it makes sense that the number of jobs needed would also increases. But Ben Tomhave can’t stand this narrative. He makes the case that this talent gap is actually symptomatic of organizational dysfunction.