Cisco Secure Workload: Leading in Segmentation Maturity

Cisco Secure Workload: Leading in Segmentation Maturity

As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the forefront of this shift, offering solutions to help organizations reach segmentation maturity.  What is segmentation maturity?  Segmentation maturity is about…

Read More

Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More

Business Leader’s Guide for a Successful Microsegmentation Project

Business Leader’s Guide for a Successful Microsegmentation Project

Not too long ago, during an executive briefing, I was asked a thought-provoking question by the CISO of a large airline in the US. He asked, “Brijesh, microsegmentation solutions have existed for a decade. Based on your experience, can you tell me why so many microsegmentation projects fail, and why it is so difficult to achieve microsegmentation across hybrid IT environments?” His question resonated deeply with me because it highlights a challenge many organizations face….

Read More

IPConsul automates operations with Cisco’s industrial IoT secure networking

IPConsul automates operations with Cisco’s industrial IoT secure networking

Sweet Success: How Industrial IoT Transforms Maple Syrup Farming in the Harshest Environments  When you think of a harsh industrial environment, nibbling squirrels might not immediately come to mind. For maple syrup farmers however, critters munching on tubing, bears gnawing on spouts, and equipment damaged by severe weather are just part of the routine. A remote 1000-maple tree farm in Quebec was therefore the ideal testing ground for IT service provider, IPConsul, to demonstrate how…

Read More

Redrawing the line of perimeter protection

Redrawing the line of perimeter protection

The concept of creating a barrier or ring around an environment for safeguarding can be traced back to ancient civilizations, where they had to protect themselves from marauding armies or spies infiltrating their settlements. Today, organizations are facing ever-evolving threats from outside and within their boundaries from terrorism, state-sponsored cyber-attacks, industrial espionage, politically driven activism — the list goes on. What’s more, the tools at the disposal of bad actors are more powerful than ever,…

Read More

The critical need for cyber-resilient roadways

The critical need for cyber-resilient roadways

As intelligent transportation systems (ITS) undergo rapid digital transformation, the benefits are clear: smoother traffic flow, enhanced road safety, and significant strides toward achieving climate goals. Yet, amidst these advancements, a critical challenge remains at the forefront – ensuring the security of this increasingly connected infrastructure. With the increasing number of connected systems, the attack surface grows, raising concerns about the vulnerability of critical infrastructure. The World Economic Forum has emphasized this risk, noting that…

Read More

Zero trust: A business imperative for the digital age

Zero trust: A business imperative for the digital age

In today’s digital world, enterprises face unprecedented cyber threats from sophisticated actors who exploit the vulnerabilities of a complex and dynamic IT environment. As organizations adopt cloud computing, artificial intelligence and other emerging technologies to enhance their business capabilities and competitiveness, they also expose themselves to new attack vectors and risks.  According to a report by IBM, the global average cost of a data breach in 2024 — a 10% increase over last year and…

Read More

Maximizing business benefits with robust hybrid cloud security

Maximizing business benefits with robust hybrid cloud security

Byline: Chris Jenkins, Principal Chief Architect at Red Hat  The evolution of containers and hybrid cloud technologies has brought significant benefits to the enterprise. These platforms democratize access to new applications and technologies, enabling teams to work more seamlessly together and facilitate increased innovation within the organization. Over the last few years, IT leaders have been championing migrations from on-premises based virtual machines to containers and the hybrid cloud accordingly, with almost three quarters (73%)…

Read More

Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Combating cyber threats with zero trust and supply chain security

Combating cyber threats with zero trust and supply chain security

The cyber threat landscape is growing more complex and challenging to contend with, exacerbated by advancements in artificial intelligence and increasingly sophisticated cyber criminals. The volume and severity of attacks are increasing in tandem; Keeper Security’s 2024 Insight Report revealed that 92% of IT security leaders have seen an increase in cyber attacks year-over-year.  Among the most pervasive threats to enterprises today are software supply chain attacks. The 2024 Verizon Data Breach Investigations Report revealed…

Read More
1 2 3 13