Infrastructure & Endpoint Security
The Zero Trust Network Security (ZTNS) software is an essential part of almost all security…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Endpoints remain a popular attack vector. Factors like the proliferation of IoT devices and trends…
Technology is a funny thing. It can create and destroy. The starkest example of this…
The world runs on the cloud. One outage can create a lot of havoc. However,…
Ransomware is a word that brings nothing but dread to anyone’s mind. Imagine logging in…
Application, Data & Identity Protection
The Zero Trust Network Security (ZTNS) software is an essential part of almost all security…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Vibe or AI-assisted coding is the “in” thing right now. It is clear why. First…
Going by their ubiquity, we can safely say that the API economy is booming. The…
How does the idiom go? If it looks like a duck, swims like a duck,…
Technology is a funny thing. It can create and destroy. The starkest example of this…
Monitoring, Response & Threat Intelligence
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Technology is a funny thing. It can create and destroy. The starkest example of this…
The world runs on the cloud. One outage can create a lot of havoc. However,…
Despite everyone’s best efforts, DDoS attacks continue to be a nuisance. The emergence of new…
The Managed Detection and Response (MDR) services are witnessing increasing year-on-year growth because of powerful…
Threat intelligence is a vital part of organizational security. It allows organizations to move from…
Governance, Risk & Human-Centric Security
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
To paraphrase Mark Twain, the reports of the impending death of SD-WAN following the rise…
Technology is a funny thing. It can create and destroy. The starkest example of this…
Privileged Access is a double-edged sword. In the right hands, they are useful for modern…
I have a theory about the widespread adoption of the agile methodology. It allows companies…
Security teams across the world are battling severe crises, including personnel shortage and burnout. In…