Setting up network segmentation is best practice, whether using a series of VLANs or some other method. While we tend to ...
As the industry has gotten better at locking down endpoint devices such as laptops, threat actors are finding new ways to infiltrate an organization’s systems—and they’re seeing more and more success.
There were lots of product announcements at the recent RSA Conference, and I’ll be talking about those for quite a while. Today I want to mention one from Gemalto, the company formed by the merger of ...
Leeron is a New York-based writer who specializes in covering technology for small and mid-sized businesses. Her work has been featured in publications including Bankrate, Quartz, the Village Voice, ...
Traditional attempts to merge IT/OT threat detection, network segmentation, and secure remote access are impractical in today ...
As Tufin's Field CTO, Erez Tadmor bridges the gap between customers, marketing and product teams, educating on security best practices. The landscape of network security is undergoing a significant ...
As convenience retailers face increasingly sophisticated cyber threats, technology solutions must evolve to protect sensitive customer data ...
One of the benefits of 5G is that it enables a massive influx of devices to be connected to the internet, thanks to its superfast speeds and always-on reliability. The technology enables more data ...