Category

Digital Transformation
Deep learning is a term that you are most likely hearing often. We have entered into an advanced age of technology and there are a lot of questions circulating around this subject. What is deep learning? Is it artificial intelligence? When will we see more evidence of AI integrated into our lives? The answer is,...
Read More
Written by: Teju ShyamsundarSenior Product Marketing Manager at Okta The current state of device based access control It’s no secret that devices have changed the way we work. Mobility has transformed the enterprise enough to redefine the term “mobile device.” With modern management techniques for mobile form factors as well as laptops and tablets, the...
Read More
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
Mobile phones have a huge impact on the day-to-day lives and the way one communicates with the world. With leading mobile messaging platform WhatsApp recently revealing a major security flaw that could let hackers access phones, it’s time to reconsider safety measures for mobile networks. Even in the corporate world, it’s hard to find an...
Read More
Written by: Michael Busselen of Crowdstrike The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,”includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends...
Read More
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for...
Read More
Written By: Jen Toscano As enterprises embrace digital transformation, they must find a new way to manage networking and security. Many are turning to SD-WAN to reduce MPLS costs, simplify branch IT, increase agility, and deliver an improved user experience. But, securing SaaS and internet-bound traffic for all users at all locations—without compromising on security—can present obstacles....
Read More
Written by: Dan Shelton One of the most tragic things in the world of IT is when people adopt a new technology but don’t adopt a new way of working. The reason this is a problem is that almost every piece of enterprise software is much more than the application itself. It’s also a mindset,...
Read More
Written by: Deepen Desai Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing the Zscaler cloud in the second half of 2018 and prepared a report of our findings. The Zscaler cloud processes...
Read More
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of...
Read More
1 2 3