Second acquisition for SonicWall in two months
Years of high-profile breaches have spurred movement – at least overseas
IT Leaders Summit debates the true purpose of endpoint security.
A panel at the Computing Cybersecurity Festival discussed some of the challenges created by a zero trust architecture, and why automation isn't always the answer.
IT leaders from legacy institutions and startups are all moving towards least-privilege
A security model driven by automation is appropriate for professionals managing multiple IT environments across vendors
ThreatLocker VP operations explains how stopping illegal conversations between software programs could have prevented exploitation of the major vulnerabilities of the past two years
IT estates are a mix of old and new, on prem and cloud - how to ensure all parts play nicely together?
'Don't trust anything. Zero trust is the mindset we should apply'
The need to support WFH and flaws in the perimeter model has pushed ZTN to the fore