Very few weeks go by without headlines circulating about cybercrime. It could be a large data breach or a ransomware attack. Yet, somehow this regular drumbeat of news manages to obscure just how huge a problem we face and the […]
Very few weeks go by without headlines circulating about cybercrime. It could be a large data breach or a ransomware attack. Yet, somehow this regular drumbeat of news manages to obscure just how huge a problem we face and the […]
In professional sports, there’s a saying: Offense wins games, defense wins championships. With football’s Big Game ringing in our ears, it’s a good time to consider how that idea applies to hard-charging startups trying to scale their success. In football, […]
Executive Summary Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior […]
Healthcare-related business from clinics through to insurance providers and pharmaceutical companies face significant challenges in the coming years. They are changing the way they produce and access data, opening up new opportunities for supply chain efficiency, customer service, and patient […]
As an IT consultant with 20 years in the business, Arnaud Cassagne has seen — and been part of — the evolution in IT infrastructure that’s been ongoing since the turn of the century. He’s worked with organizations as they’ve […]
In the first half of our SASE series, we addressed some of the basics of the SASE framework – what it is, who it’s designed for, and some common misconceptions about what SASE does and doesn’t do. In the second […]
Is anyone else tired? When looking at the sheer scale of the cybersecurity landscape it can feel like a never-ending stream of changes. Much like Sisyphus pushing the boulder up the mountain, just when you feel like you have a […]
As a relatively new framework, there remains a good deal of confusion around what SASE does and what it wasn’t designed to do. In this post, we’ll take a look at some of the top common misconceptions about SASE and […]
In the first post of our SASE series, we outlined some of the specific challenges SASE addresses and why this model for distributed applications and data represents a more unified and streamlined approach for modern IT organizations. Now we will […]
We are living through a sea change in federal technology procurement. This sea change is more than just modernization mandates. It is the mindset shift from purchasing discrete pieces of infrastructure to architecting a platform that arrays many moving parts […]