What is a Customer Experience Reference Architecture?  

Creating and deploying a customer experience reference architecture is tricky, but microsegmentation can drastically increase the chances of success  Customer experience reference architecture is the structured framework or model that provides guidance ...

The Strategic Advantage of a Multi-Layered Cybersecurity Approach

Adopting a multi-layered cybersecurity strategy has become an imperative like never before   As we all know, cybersecurity threats are becoming more sophisticated and pervasive, posing an immense challenge to businesses. Now, more ...

The Benefits of Network Segmentation

Boosting security, streamlining performance, and other benefits of network segmentation In an era of ever-evolving cyber threats, adopting robust security measures is no longer optional for organizations. One such essential measure is ...

The Benefits of Network Segmentation

Boosting security, streamlining performance, and other benefits of network segmentation  In this current era of ever-evolving cyber threats, adopting robust security measures is no longer optional for organizations. One such essential measure ...
printers

Implementing Zero-Trust? Don’t Forget About Printers

When John Kindervag defined the zero-trust model in 2010, printers were not top-of-mind. As the adoption of this model increases, it is likely that most people are still not taking printing into account as ...
Security Boulevard
Trend Micro supply chain Akamai guardicore atom microsegmentation

Survey Sees Greater Appreciation of Software Supply Chain Risks

A survey of 1,000 organizations in North America, Europe, Asia-Pacific and Japan found potential attacks against software supply chains are now a bigger concern than attacks that exploit zero-day vulnerabilities or ransomware ...
Security Boulevard
trade-offs, users, deception devices Cato Networks BYOD tablet Mobile Devices for GDPR Compliance

BYOD Finally Goes Mainstream

The concept of bring your own device (BYOD) is not new, but with the abrupt shift to remote/hybrid work forced businesses that once balked at the idea to accept it, if not ...
Security Boulevard

How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

Organizations can take various steps to protect their operational technology (OT) environments against digital threats. But some stand out more than others. In particular, network segmentation is described as “the first answer ...
cyberattacks breaches

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege ...
Security Boulevard
DNS SASE network segmentation palo alto networks Defenses of Ad Networks

Automated Network Segmentation is a Security Service Away

Network segmentation is a practice as old as Ethernet. Though it was originally a practice to limit broadcast domains, as the number of connected devices and environments grew, the applicability of segmentation ...
Security Boulevard