Application Delivery in the Age of SDN

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. As the dust begins to...

US Bank Attacks in Review – It’s a Brave New World

An article published in the New York Times last Wednesday touched off a media frenzy by suggesting that Iran has been behind the cyber...

The New Weekend Warriors – Information Security Pros

As a former military veteran, I fully understand that the term “weekend warriors” is typically used to refer to military personnel on reserve status....

Mitigating Attacks in 2013: The Year Companies Push Hackers Back

In 2012, DDoS attacks revealed a new cyber security trend: attack campaigns that last for days and sometimes even weeks. Unfortunately, many organizations that...

Application Delivery Controllers (ADCs): The Last Physical Hurdle to the Software Defined Datacenter (SDDC)

Effectively a next generation load balancer, enterprises are deploying Application Delivery Controllers (ADCs) to front-end their mission critical applications. The enterprise ADC market is...

Road-show in APAC: It Was a Hell of a Ride!

A couple of weeks ago I returned from a business trip to Korea and China where I met with a number of customers and...

Recapping the Bloomberg Enterprise Risk Conference

On Nov 29th I had the good fortune to participate in a 45-minute panel discussion at the Bloomberg Enterprise Risk Conference on the following topic: “WHEN STATE-BASED,...

Software-Defined Networking – Sit On The Fence Or Take Action

As the industry and the media keep feeding the Software-Defined Networking (SDN) hype and vendors introduce SDN products into the market – it is...

A Study in Cyber Attack Defense Contrasts: Op Ababil vs OpIsrael

There is no doubt that the last couple of months have been historic in the world of cyber security. In October, it was US...

Security Week Article: The Missing Layer Against Encrypted Attacks

I recently contributed another column to Security Week about attackers launching attacks over HTTPS more than ever before. With an increased level of encrypted...