IntellaStore® IV, APCON’s new network security appliance, offers the on‑box APCON Intelligent Processor (AIp) to run the user’s choice of security applications including APCON’s own ThreatGuard ...
The gap between what traditional architectures were built to handle and what enterprises face today is widening fast.
Modern software applications are underpinned by a large and growing web of APIs, microservices, and cloud services that must be highly available, fault tolerant, and secure. The underlying networking ...
Cloudflare has been steadily expanding its portfolio of security services over the last several years. One thing that has been missing, however, is cloud security posture management (CSPM), which is a ...
Cisco’s acquisition of startup Isovalent, developer of open-source tools Cilium and Tetragon, underscores the potential of the popular eBPF kernel technology for multicloud networking and security.
Kevin Coleman of the Technolytics Institute explains why Agile development projects need to ensure proper security is built in, not bolted on Application security has become a critical component of ...
Jody Brazil, CEO and Cofounder of FireMon, brings 20+ years of tech leadership, driving growth and innovation in security solutions. When it comes to network security, investing in the latest ...
When evaluating cloud security platforms, one question comes up again and again: “How many Points of Presence do you have?” At first glance, the logic seems sound. More locations should mean lower ...
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed to infect these devices and lie ...
The weakest link in my security experience is application security. It never mattered a lot, because I always had someone working for me who had the experience I lacked. That all changed when I came ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results