Some security professionals are stating that "endpoints are the new perimeter." If true, this statement is of manifold complexity and importance -- from a security design, control, and analysis ...
Satish Mohan is the Chief Technology Officer at Airgap Networks, where he is responsible for technology architecture and program innovation. The shift to remote work during the Covid-19 pandemic has ...
Over the last few weeks I’ve been talking to analysts and security pros about virtualization, security and the evolution of netsec to virtsec. Last week I was in Los Angeles on a virtualization panel ...
Mobility, cloud computing and an increasing mobile device threat landscape are creating a significant need for endpoint security that is tight and right. And as more devices move outside the ...
Businesses generally have followed the model of protecting their business critical servers from possible cyber attacks over the years. They never really envisioned regular devices such as user ...
Four potent forces have turned network security on its head: the decentralization of corporate networks; the proliferation of mobile devices; the evolution of the bring-your-own-device (BYOD) policies ...
As enterprises invest in sophisticated endpoint detection and response tools, threat actors have pivoted toward perimeter devices — firewalls, VPN appliances, and load balancers — to gain initial ...
F5 and CrowdStrike announced a new alliance that embeds the CrowdStrike Falcon Sensor directly into F5’s BIG-IP family of network operations hardware and software. The companies say the integration ...