The cloud is far from new, but the tools, methods, and people that secure it are changing. Although the “castle” is still Security’s to protect, the guards may no longer be part of the team. Efforts are necessary to train, immerse, and provide
Acceptance of risk has overtaken the business; a dangerous position built on a crumbling foundation of decades worth of layered access. Digital transformation is fueled by and requires IT agility to ensure necessary connectivity. However, the a
Network segmentation is necessary for an efficient and secure network. But the network has changed, and so too must the network segmentation strategy. Segmenting across two sets of infrastructure necessitates a new sense of creativity within se
The model of effective security is often under a permutating name with the same emphasis: ensure the least access necessary. But as technology has evolved, so too have the solutions to manage it. So while security get more achievable, technolog
The adoption of cloud has come with a separation in ownership between the corporate legacy network and the public cloud. And while your application team doesn’t share your priority on cloud security, they are managing connectivity in the cloud.
Intent-Based Networking is meant to simplify networking – utilize software to plan, design, and implement changes to the network without reliance on human action or intervention. And while the acronym IBN is often utilized in marketing material
Unprotected. Server. Breached.These three words are as relevant in headlines today as they were in the 90s. Have we failed to translate lessons already learned to improved security?Security’s history and lessons learned are well documente
The rapid and increasing adoption of Kubernetes for application development has further obscured visibility over the network. And in this changing and fluctuating corporate network, containers, and those leveraging them, are introducing new sec
Firewalls. SDN. Public cloud. Containers. The network is getting more complex, more dynamic, and seemingly less secure. Hear from Aleck Brailsford on span of control of the network, the challenges, and approaches to securing the ever expanding
CSO magazine wrote a column in 2012 asserting that the firewall was dying and soon to be obsolete. Yet here we are over five years later, still relying on the firewall while welcoming the next generation of the technology. Hear commentary from