Why Automation is a Must Have for Disaster Recovery We have seen a spate of cloud service provider outages with overly negative economic impact. The AWS outage in December… Prakash Sinha | June 23, 2022
Cybercriminals Use Automation, Here is Why You Should Too Automated tools have become a common component of a cybercrimin’ toolkit Eyal Arazi | November 4, 2021
Value Stream Mapping & Security in Software Development Prospects see built-in security in applications as value. Keep that in mind when designing the ecosystem and mapping activities &… Ben Zilberman | September 16, 2020
What is the Future of Cybersecurity Jobs Post-COVID19? The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations. Mike O'Malley | September 2, 2020
The Quest To Automate The Business Of Fake News Automation is valuable in detecting and eliminating manipulated media, and fighting against dis- and misinformation campaigns. Pascal Geenens | December 12, 2019
Automation for NetOps and DevOps Many organizations use public cloud service providers, some in addition to their private cloud and on premise deployments. Prakash Sinha | August 14, 2019
5G Security in an API-Driven Economy Over the last six years, solution architects have been designing the transformation of Service Provider’s networks to significantly reduce the… Travis Volk | May 15, 2019
Attackers Are Leveraging Automation Cybercriminals are weaponizing automation and machine learning to create increasingly evasive attack vectors, and the internet of things (IoT) has proven… Radware | January 31, 2019
The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe? Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about… Louis Scialabba | July 17, 2018
Battling Cyber Risks with Intelligent Automation Organizations are losing the cybersecurity race. Cyber threats are evolving faster than security teams can adapt. The proliferation of data… Louis Scialabba | June 26, 2018
New Threat Landscape Gives Birth to New Way of Handling Cyber Security With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s… Carl Herberger | May 1, 2018
Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity Deciding on an appropriate application delivery controller (ADC) and evaluating the need for supporting infrastructure is a complex, complicated, and… Fabio Palozza | April 25, 2018