WiteSand’s cloud-based Network Access Control (NAC) is an alternative to systems like Cisco’s Identity Services Engine and Aruba’s Clearpas Juniper Networks has acquired cloud network access control
Against the backdrop of continuing issues with Log4J, the White House recently met with tech stakeholders to discuss how to make open-source safer Stakeholders in the
Log4J exploits continue: Microsoft
FTC warns businesses to step up mitigation efforts to protect consumers Microsoft this week offered Windows and Azure users updated guidance on mitigation strategies to contend with the
Google Cloud IDS simplifies virtual private cloud network threat detection
Developed with Palo Alto Networks, Google Cloud IDS is now available in all regions, according to a statement from the company; Google Cloud IDS debuted
Well, technically… cybersecurity needs diversity: Tanium’s Shannon Rosales Mirani (Ep. 59)
Shannon Rosales Mirani, senior human resources business partner for global sales at Tanium, comes on the podcast to discuss how prioritizing diversity and equity helps
Well, technically… the value of STIR/SHAKEN cannot be overstated: Twilio’s Julie Kearney (Ep. 42)
Robocalls keeping blowing up your phone? Twilio’s VP of Communications Regulatory Affairs and Policy details how the TRACED Act and STIR/SHAKEN might finally put an
Huawei Technologies USA Chief Security Officer highlights the need for consistent security standards across the telecoms industry With ICT vendor Huawei Technologies largely locked out of
Well, technically… 70% of data breaches happen from endpoints: Janet Giesen, Metallic (Ep. 9)
RCR Wireless News · Well, technically… 70% of data breaches happen from endpoints Janet Giesen, VP of operations at Metallic, discusses how the SaaS company adjusted
The pandemic has highlighted the importance of personal data and digital connectivity, to the detection, treatment, and prevention of COVID-19. The major social media platforms
Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon’s annual Data Breach Investigations Report. Web application attacks doubled
Huawei Webinar: Cybersecurity Testing System in Europe
Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential
Network usage has shifted dramatically since mid-March, when the COVID-19 pandemic began having significant impacts in the U.S. As enterprises and government agencies cope with
Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users,
With 5G currently available as a consumer-facing service in key geographies including China, Western Europe and U.S., operators and end users are already exploring what’s