Forget detection: in Security 2.0, visibility is the key to long-term protection
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
With specific-purpose tools becoming obsolete within years, long-term vision requires better views of extending networks
David Braue | 31 May | Read more
The security threats posed by external and internal intruders cannot be overstated, and will become even more significant as compliance and operational requirements continue to tighten.
David Braue | 18 Jan | Read more
The rapidly rising tide of cybersecurity attacks has naturally driven security and IT managers to strengthen their perimeters and bolster their defences. But without paying similar attention to what’s happening on their internal networks, they are leaving massive blind spots that could potentially produce catastrophic results.
David Braue | 13 Dec | Read more
Metadata has been in the news over the last couple of years.
Anthony Caruana | 02 Aug | Read more
Information security's roots in IT have traditionally left CIOs and CISOs wrestling to contain the business risks it creates, but growing board and C-level involvement in cybersecurity is reshaping that tradition as business guidance holds cybersecurity practitioners to new standards of governance and risk management.
David Braue | 29 Jun | Read more
The breakneck growth of the Internet of Things (IoT) has taken many technology prognosticators by surprise – but there will be other, far less pleasant surprises in store if IoT manufacturers can't improve their security practices quickly enough to avoid a data disaster.
David Braue | 28 Jun | Read more
Adding connectivity to all manner of devices has created immense opportunities to build self-monitoring, self-managing networks that leverage ubiquitous computing to deliver services in entirely new ways. Yet with this opportunity also come new threats, as Internet of Things (IoT) visionaries recognise the need to embrace new forms of information security to prevent malicious exploitation of their expansive visions.
David Braue | 20 Jun | Read more
The rush to embrace cloud computing may be the defining trend of the decade, but businesses thinking public-cloud adoption relieves them of their information-security obligations should think again – and remember just what it takes to keep on top of an expanding hybrid enterprise infrastructure.
David Braue | 10 Jun | Read more
The stealthy design of today's advanced persistent threats (APTs) has given potential targets an hint of an advantage that could reverse the longstanding “asymmetry” between attacker and defender, the chief technical officer of security firm Gigamon has noted as organisations increasingly re-evaluate their security defence to accommodate the new rules of malware engagements.
David Braue | 30 Oct | Read more
SYDNEY, July 22, 2015 – Gigamon Inc. (NYSE: GIMO), the leader in traffic visibility solutions, today transformed the industry by launching GigaSECURE®, the first Security Delivery Platform that provides pervasive visibility of network traffic, users, applications and suspicious activity, and delivers it to multiple security devices simultaneously without impacting network availability.
Gary Newman | 22 Jul | Read more
ForeScout has named a new CEO who has big plans for making the company's products the remediation layer of choice for other vendors' security offerings that find problems with endpoints but can't fix them.
Tim Greene | 27 Feb | Read more
Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.
Jeremy Kirk | 29 Oct | Read more