Reducing ‘Cyber-security Engineer Burnout’
A first-hand experience of the workload challenges security engineers face, and how their employers can help to address them By Tim Bloomer, a Sales Engineer at AlgoSec I’m sure we’ve…
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract…
The Limitations of SASE and Zero Trust
By Jayant Shukla, CTO, and Co-Founder, K2 Cyber Security Over the past several years, two industry buzz terms have really started to gain traction. SASE (Secure Access Service Edge) was…
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security By Kaushik Narayan, CTO Cloud Business Unit, McAfee While cloud services deliver on promised savings and convenience, they still…
The Challenges of Industrial 3D NAND
By Roger Griesemer, General Manager Memory Solutions, Swissbit AG and Ulrich Brandt, Technical Director Marketing, Swissbit AG 3D NAND is a popular topic on websites, in magazines, in advertisements and…
Building Trust: The Path to True Security Synergy Between Appsec And Developers
By Matias Madou, co-founder and CTO, Secure Code Warrior A relationship that is built on the shaky foundations of mistrust is, well, best approached with low expectations. Sadly, this can…
Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions
Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like…
Years of Iot Hacking, But What Have We Actually Learned?
By Brad Ree, CTO, ioXt Alliance Since the inception of the Internet of Things (IoT) in 1999, connected devices have been integrated into nearly every industry, from retail to automotive…
Are Your Corporate Networks Ready for An Impending ‘Return to Work’ Cyber Attack?
As employees rejoin the network, cyber risks are heightened. Why it’s important to have essential security measures in place before it’s too late. By Stephen Burke, Cyber Risk Aware CEO…
Acronis Cyber Readiness Report
Pandemic reveals cybersecurity gaps, need for new solutions By Peter Hale, Sr. Content Manager, Acronis As businesses around the world reacted to the COVID-19 pandemic, many had to address new…
Automotive Cybersecurity Is Not One-Size-Fits-All. Here’s How Oems And Tier 1s Can Tailor Their Approach to Meet the Needs of The Market
OEMs, Tier 1s, and key supply chain players all differ in their approach to cybersecurity, opting for strategies that align specifically with their needs. Chief Product and Marketing Officer Nathaniel…
Privacy Shield Revoked
What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data…