At a media event in downtown San Francisco Monday, a group of Cisco's top security bigwigs gathered to unveil Cisco SecureX, a next generation security architecture that includes new scanning elements ...
Cloud security company Zscaler Inc. today debuted Zscaler Zero Trust SASE, a single-vendor secure access service edge solution, and also announced the general availability of its Zero Trust SD-WAN ...
Whether it’s in the area of securing network access or security operations, massive shifts are coming to some of the most-established segments of cybersecurity—and partners have a central role to play ...
As the digital landscape evolves and cyber threats become increasingly sophisticated, organizations are seeking innovative solutions to protect their valuable assets. Jay Chaudhry (pictured, left), ...
Built to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in ...
Bruce Johnson has been in the IT industry for more than 30 years with IBM, Cisco Systems and now Cradlepoint. He is a security CISSP and has worked in security for more than 20 years. He frequently ...
Secure access service edge (SASE) is the Taylor Swift of enterprise technologies. IT audiences can’t seem to get enough of it. Seizing the enthusiasm surrounding the architecture, technology analysts, ...
Network-as-a-service promises agility and efficiency, but its shared, dynamic nature demands a fundamentally new approach to cybersecurity. Learn how to secure your distributed NaaS environment.
While most sectors aim for profits and growth rates, the healthcare industry’s success is defined by how well it serves the public and sustains the public’s well-being and safety. Since healthcare is ...
Traditional attempts to merge IT/OT threat detection, network segmentation, and secure remote access are impractical in today’s world, Cisco exec says. Cisco has plans to deliver the same network and ...
To move AI from pilot to production at scale, technology leaders are rethinking how their networks handle data flow, security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results