The 3 critical steps to a bulletproof access strategy

It’s an on-the-move, BYOD, cloud-based world. It’s just a fact. And for IT, Security, and Compliance teams – it’s a fact that makes life challenging.

Read More

The one thing you can trust: Zero Trust is here

It is not every day you can wake up and start your morning with exciting news that reinforces your belief in the correctness of your vision and of the professional path you have chosen.

Read More

14 Influential Cloud Security, Infosec & DevOps Experts to Follow

Cloud technology demands big thinkers. As our networks become decentralized, the management and security challenges have grown exponentially, while the attack surface has expanded to the point of...

Read More

Does Cisco DNA contain critical flaws?

Alarmed by the title? Well, although there is nothing genetically wrong with Cisco, recently discovered vulnerabilities show that your IT network could be in grave danger because you have used...

Read More

Call to participate in market research: How do you secure access to corporate applications?

The modern enterprise IT team needs to govern user access and protect the corporate assets that now live in hybrid, dynamically changing environments.

Read More

Is this really Cloud Computing? (Lessons learned from a recent Cisco SSL VPN Vulnerability)

As some of you have heard, on January 29th, Cisco has disclosed information about a Remote Code Execution and Denial of Service vulnerability that affects a number of their security product...

Read More