Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Author: Nikhil
Most of us will have spotted the pun in the heading from a mile away, but that is what headings are for. Their intent is to arouse curiosity about the content. If you have come this far, it means we have succeeded in drawing your attention. So, without much ado, let us talk about the topic: A comparison of 2024 and 2025 SPARK matrices for the Security Orchestration and Response (SOAR) market. SOAR tools are becoming necessary as they help SOCs detect, investigate, and respond to threats faster. It achieves this objective by automating repetitive tasks and orchestrating (executing multiple…
If one wants to know about how severe DDoS attacks have been, here are some numbers from Cloudflare: In the first quarter of 2025, the company blocked 20.5 million DDoS attacks. As per the company, it is a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. And these numbers are from just one (albeit a very big) company. And it is not just the numbers, the size and sophistication of attacks have been on the rise. Cloudflare itself saw off an attack measuring an astounding 7.3 terabits per second in January 2025. Not only the attack sizes, but…
Even as healthcare becomes increasingly digitalized owing to various benefits such as enhanced patient monitoring, it has opened up new attack surfaces. These threats are much more terrifying. Financial and brand image losses can be recovered, but attacks on healthcare facilities can be fatal. There is no recovery after death. This disadvantage makes securing these systems against various threats like ransomware a must-do strategy. This analysis includes major vendors and their rankings as per customer impact and technology excellence. These rankings can be a vital asset while choosing a product that is the best fit for your establishment. Let us…
We are halfway through 2025, and it seems we are reading about data breaches almost every day. The victims include some of the biggest global corporations, such as U.S. employee screening service DISA (over 3 million affected), Oracle, Marks & Spencer, and telecom giant AT&T (while the breach was in 2024, stolen data of 86 million customers went on sale in June 2025). Customers expect the companies to protect their data. This expectation has clearly not been fulfilled. What can be some (likely) reasons behind this? The first reason is the most popular one: AI/ML. AI is allowing the bad…
While we have already analyzed the 2023-2024 market situation, a lot can change in a year. Especially with the current industry landscape becoming completely upended by the continued strengthening of newer technologies like AI, it is important to compare the market situation in 2025 with 2024 to see who has adopted the newer technologies in a better manner than their peers and thus provide products that are up to date with the current networking landscape. So, without further ado, here is the 2024-2025 comparison of key players in the Software Defined-Wide Area Network (SD-WAN) market. Let us start with a…
SD-WAN SPARK comparison 23-24 A matrix is vital to capture the vendor landscape of a particular domain. It allows users to gauge company products’ quality, specific strengths, and weaknesses, to help them to choose the product that is the best fit for their particular requirements. Here, we will examine the SPARK Matrix for the Software Defined-Wide Area Network (SD-WAN)) for the years 2023 and 2024. Let us start with a comprehensive list of participants, their ranks for both years, and the likely reasons behind their rise, staying put, or dropping out of the quadrant. Vendor2023 posiiton2024 positionChange / MovementVMware LeaderLeaderNo changeFortinetLeaderLeaderNo…
As the threat landscape keeps evolving, the tools to tackle the varieties of threats are leading to fragmentation of security solutions, organizations have to juggle an average of 83 different security solutions from 29 vendors. This fragmentation is costing companies a lot, as per a study by IBM and Palo Alto Networks. Thus, it is time that the spending on organizational security be shifted to a dynamic, agile model that will allow scalability, adaptability, and usage-based security. Organizational spending is closely tied to such transformation. Treating infrastructure as a capital asset is likely to result in obsolete systems that may…
Digital transformation in full swing and is increasing the complexity of networks. There are too many devices for manual configurations to handle. The environments themselves are constantly evolving. Some may be on-premises, others may be multi-cloud, or hybrid. They are also continuously changing as more channels and policy changes, such as hybrid or WFH get enforced. Compliance with a wide range of data protection laws is another concern. All these problems can be solved with Network Automation tools. We have seen why the software is needed, now we will see what trends are expected in the market for these software…
Emails remain one of the key tools of communication. It also remains a favorite target of bad actors. Here, we will see what threats, mitigation tactics, and technology adoption for enterprise email systems we can expect in 2025. AI/ML to combat GenAI threats Generative AI’s capabilities are being used and misused. The bad actors are actively using the technology to create and launch a variety of cyber threats. The threats include novel threats, zero-day exploits, and spear-phishing attacks that specifically manipulate environment-specific vulnerabilities. So how does AI help the good guys? First, let us see how the components of AI…
Mobile devices’ use continues to grow. While threats like phishing continue, the attack surface is also being increasingly stretched as users now use the devices to access critical organizational data. Users are also using third-party apps on secured devices. As a result, threats to endpoints like mobile devices continue to increase, turning them into potential vectors for incidents like breaches, data theft, and various types of fraud. Here, we will see the trends expected in 2025 to combat these threats. Zero-trust adoption rise: Zero trust access continues to be a game changer because of its principle of “trust no one,…