network security

January 31, 2018

SECURITY

Network Visibility for Mergers and Acquisitions

3 min read

Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials...

January 10, 2018

EXECUTIVE PLATFORM

Cisco Extends Encrypted Traffic Analytics to Nearly 50,000 Customers

4 min read

It’s here. Cisco has solved one of the biggest challenges facing the security industry – and now thousands of Cisco customers can start using this breakthrough new network security technology....

September 27, 2017

SECURITY

When it Comes to Network Security, Your Best Defense is Security Everywhere!

3 min read

New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach...

September 25, 2017

SP360: SERVICE PROVIDER

For Telecom service providers, cyber security is not an add-on

2 min read

A rigorous and holistic approach to cyber security is critical for Telecom, OTT and other IT service providers, because trust is at the heart of their business. Learn more.

February 7, 2017

MANUFACTURING

A Bromance for the Ages: When IT met OT

1 min read

To this pantheon of duo-ed greatness we now add Chad from IT (Information Technology) and Stan from OT (Operational Technology). This is their story.

August 2, 2016

GOVERNMENT

Cybersecurity for Defense: Insider Threat Part 1

2 min read

The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat” security program and how does it affect the Department of Defense? To start with, the National Counterintelligence and Security Center defines an inside threat as occurring […]

Network Security is Not Child’s Play

3 min read

Do you remember the childhood game Gossip? Maybe you played it. A secret message is whispered from one person to the next until it reaches the last person who says out loud what they believed they heard. Whether by an honest misunderstanding or intentional sabotage, often the end message is nothing like the original. Now, […]