-
Balancing Privacy for Good (Post)
“The processing of personal data should be designed to serve mankind. The right to the protection of personal data is not an absolute right; it must be considered in relation to its function in socie ...
-
Cloud trends show customers increasing investments in hybrid and multicloud (Post)
Across every industry and geography, companies are working hard to keep pace with evolving business needs and build on their existing digital investments. In my role leading the product team for the ...
-
Considerations for Securing a Work-from-Anywhere World (Post)
During the pandemic, transitioning to a work-from-home model required organizations to move critical resources to the cloud, ensure employees had access to essential business applications, and secu ...
-
Data leaks and employee motivation (Post)
How employee motivation changes with a company’s data loss.What consequences do data leaks have for employees? To answer this question, we start by exploring the causes of most such incidents, which, ...
-
Addressing Top SD-WAN Security Concerns (Post)
This is a summary of an article written for Network Computing by Fortinet’s CMO and EVP Products, John Maddison. The entire article can be accessed here.For many networking teams, making the move to ...
-
While IoT security standards lag, IoT security companies innovate – Overview of trends in IoT cyber security (Post)
While IoT and OT devices proliferate, IoT security standards and regulations are few and far between. Unsurprisingly, this puts individuals, enterprises and states at major risk. In this post, we pre ...
-
Top 6 Security Challenges for CISOs in 2024 (Post)
What to expect for these emerging trendsIn the ever-evolving landscape of cybersecurity, staying ahead of the curve is not just a goal; it's a mandate. As we approach 2024, the digital frontier becom ...
-
7 Critical Components of Disaster Recovery (Post)
According to the Federal Emergency Management Agency (FEMA), 40% of businesses fail to reopen after a disaster (flood, fire, hurricane, blizzard or earthquake). Businesses that lose critical data ...
-
New decade, same old cyber-threats? What 2020 may have in store (Post)
The threat landscape is a volatile place at the best of times. but the unparalleled increase in corporate digital spending on the one hand and black hat innovation on the other is set to make 2020 an ...
-
Wi-Fi 6E: The evolution of next generation wireless access. (Post)
Wi-Fi 6 just arrived, bringing better speed and more capacity to wireless networks. And soon it’s going to get even better, thanks to the FCC opening up of all-new 6 GHz frequencies for Wi-Fi 6. The ...
-
Threats Can Be Anywhere: Modernize Your Data Center Security (Post)
Virtualization, cloud, and software-defined networking are redefining the modern data center. There is a huge influx of data, from big data analytics and new types of applications. Workloads are even ...
-
Top GenAI Threats – and why Zero Trust AI Access is the Future (Post)
Large Language Models (LLMs) are revolutionizing the way we interact with technology. As a result, SaaS vendors are vying for a competitive edge by integrating AI features, offering enterprises tools ...