The old saying, “history doesn’t repeat itself, but it often rhymes,” proves itself time and again with computers. In my recent analysis
SaaS Management and Application Discovery
The old saying, “history doesn’t repeat itself, but it often rhymes,” proves itself time and again with computers. In my recent analysis
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past (you
There’s a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution. But
In simplistic definitions, the edge is characterized as simply moving workloads closer to end users to reduce network latency associated with clouds.
As a seasoned CIO/CISO and tech industry analyst with 35 years of experience, I’ve seen my fair share of cybersecurity incidents. However,
It is common in today’s workforce to find multiple generations working alongside each other. While to some extent this has always been
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices, and
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration in
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of monitoring
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and explored