Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not...
Learn more
Leadership Compass
Leadership Compass
API Management and Security
This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements...
Learn more
Frontier Talk
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch , to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to...
Learn more
Microservices in Identity and Access Management
Blog
Microservices in Identity and Access Management
Microservices in Identity and Access Management
Video
Microservices in Identity and Access Management
Analyst Chat #9: The Dark Side of the API Economy
Analyst Chat
Analyst Chat #9: The Dark Side of the API Economy
Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.
Malicious Actors Exploiting Coronavirus Fears
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Compromise of IOTA
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Ambient Intelligence Can’t Mature Without an Identity Protocol
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Moving Towards AI and IoT Solutions Beyond Machine Learning
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
API Management and Security: Don’t Trade Protection for Convenience
Webinar Recording
API Management and Security: Don’t Trade Protection for Convenience
Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As...
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Palo Alto Networks Continues to Bet on Security-as-a-Service
Blog
Palo Alto Networks Continues to Bet on Security-as-a-Service
The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an...
There Is No “One Stop Shop” for API Management and Security Yet
Blog
There Is No “One Stop Shop” for API Management and Security Yet
From what used to be a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital...
Previous
6 7 8 9 10 11 12 Next