Infrastructure & Endpoint Security
Networking is essential for both humans and technology to progress further. Like humans, IT infrastructure has also been shaped by the evolving changes…
While we may think ransomware is a 20th-century phenomenon, it has existed in its most…
While adoption of SASE is accelerating across all sectors due to a variety of reasons,…
Digitalized healthcare provides numerous benefits. These include improved patient outcomes through personalized care, enhanced access…
Are most of the CAPTCHAs we see today are even trying to block automation? The only users CAPTCHAs are stopping are the elderly, visually challenged, people on low-end devices, users with shaky connectivity, and non-native language speakers.
Theoretically, it is a simple choice. It is preferable to opt for full SASE over…
Application, Data & Identity Protection
The number of incidents involving stolen credentials in 2025 is, to quote an ancient meme,…
While we may think ransomware is a 20th-century phenomenon, it has existed in its most…
Are most of the CAPTCHAs we see today are even trying to block automation? The only users CAPTCHAs are stopping are the elderly, visually challenged, people on low-end devices, users with shaky connectivity, and non-native language speakers.
An SBOM is a comprehensive list of all the software components, dependencies, and metadata associated…
The Zero Trust Network Security (ZTNS) software is an essential part of almost all security…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Monitoring, Response & Threat Intelligence
An SBOM is a comprehensive list of all the software components, dependencies, and metadata associated…
Endpoints remain a perennially favorite vector for many types of cyberattacks. Hence, endpoint monitoring and…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Technology is a funny thing. It can create and destroy. The starkest example of this…
The world runs on the cloud. One outage can create a lot of havoc. However,…
Despite everyone’s best efforts, DDoS attacks continue to be a nuisance. The emergence of new…
Governance, Risk & Human-Centric Security
While the dead internet theory may be considered a conspiracy theory, there are, in fact, a lot of bots on…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
To paraphrase Mark Twain, the reports of the impending death of SD-WAN following the rise…
Technology is a funny thing. It can create and destroy. The starkest example of this…
Privileged Access is a double-edged sword. In the right hands, they are useful for modern…
I have a theory about the widespread adoption of the agile methodology. It allows companies…