The evolution of network environments towards distributed, cloud-centric architectures in the work-from-anywhere era has brought unique challenges to network security. The industry’s shift to comprehensive cloud-based services like Secure Access Service Edge (SASE), Security Service Edge (SSE), and Secure SD-WAN reflects the evolving needs of distributed workforces and cloud-centric IT environments in a rapidly evolving […]

Enea Unveils Qosmos Threat Detection SDK to Boost Network Security

As the networking landscape rapidly shifts with data, applications, and infrastructure migrating to the cloud, Enea, a leader in telecom and cybersecurity, has launched its Qosmos Threat Detection SDK. This SDK addresses the limitations of conventional intrusion detection systems (IDS), which struggle to meet the evolving demands of cloud-based, multifunction security platforms. Filling the Gap […]

Cybersecurity for a Cloud-First, Work-from-Home World (Part 2)

An Interview with Joe Green, Netskope The number of employees working from home or other remote locations has skyrocketed since the outbreak of the coronavirus pandemic. This massive shift has led to a rise in the use of cloud applications and services, along with an increase in risky behaviors and a further blurring of the […]

Cybersecurity for a Cloud-First, Work-from-Home World

An Interview with Joe Green, Netskope Key takeaways There are risks associated with a remote workforce and the at-home use of business devices and IoT devices, but the right tools are available now to continuously manage these risks. There is an ongoing increase in cloud-delivered malware, and more data loss via cloud file sharing, hosting, […]

Network Traffic Analysis: Why Now?

Enterprises have made heavy investments in their own Security Operations Centers (SOC), or in SOC services delivered by Managed Security Service Providers (MSSP), but breaches seem to be occurring more frequently, and with greater consequences. According to IBM’s 14th annual Cost of a Data Breach Report, between July 2018 and April 2019, the average total […]

Faster Detection of Cyber Attacks: Using Deep Packet Inspection to Identify Lateral Movements

Deep Packet Inspection (DPI) technology, embedded in cybersecurity software, can enable faster, more accurate detection of network infiltration. DPI examines the data part of a packet as it passes an inspection point and alerts to any non-compliance protocols, viruses, spam, and malware. Leveraging DPI software to detect abnormal activity such as lateral movements can help […]

Share this page