Rajesh Maurya

Effectively defending against cyberattacks today requires security teams to work smarter rather than harder. Cybercriminal strategies target every link in an attack chain, from gathering information...
Feb 15, 2022
4,069
0
The traditional network perimeter has been replaced with multiple edge environments that include WAN, multi-cloud, data center, Internet of Things (IoT), and home and other remote workspaces. All of...
Jan 11, 2022
4,038
0
For many business leaders around the world, there’s been no hard-and-fast decision on whether or when the majority of employees will return to an in-person office space. Companies are hearing a...
Dec 09, 2021
3,975
0
During the pandemic, transitioning to a work-from-home model required organizations to move critical resources to the cloud, ensure employees had access to essential business applications, and secure...
Oct 26, 2021
4,412
0
Security incidents and data breaches can have very disruptive and devastating effects on an organization. In fact, according to the Ponemon Institute’s annual Cost of a Data Breach Report, the...
Aug 02, 2021
5,178
0
As organizations continue to accelerate their digital innovation initiatives with an effective security design, new network edges are also introduced to their security infrastructure – from data...
May 28, 2021
4,795
0
The demand for Digital Innovation (DI), driven by shifting markets, evolving consumer expectations, and digital competition, has done far more than just transform networks. It has completely changed...
Apr 14, 2021
14,004
0
2020 was a very memorable year, largely due to the global COVID-19 pandemic which continues to have rippling effects. Among the ripples are significant shifts in technology usage and a surge in ...
Feb 03, 2021
5,098
0
In 2020, we saw many rapid changes on a global scale as organizations across the world attempted to adapt to a New Normal caused by the pandemic. Amid this shift, there were significant developments ...
Dec 18, 2020
7,160
0
Recent events have forced CISOs across all industries to rethink and refine their business continuity plans. Not only did the pandemic force organizations to transform their networks to accommodate...
Nov 11, 2020
4,924
0
Whether they know it or not, employees can pose a significant risk to the security of enterprise networks and the data they hold. Considering that 68% of organizations feel moderate to extremely...
Oct 14, 2020
4,921
0
Secure Access Service Edge (SASE) is an emerging enterprise strategy that incorporates multiple solutions to enable secure remote access to on-premises, cloud-based, and online resources....
Aug 31, 2020
4,579
0
Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support...
Aug 10, 2020
4,912
0
About two years ago, CISOs were saying they were bringing back on-premises some components that they initially had started to migrate to the cloud as part of their digital transformation journey....
Jul 15, 2020
4,360
0
Across industries, owners and operators of Critical Infrastructure (CI) continue to converge the cyber and physical aspects of their businesses. This merger has enabled more efficient and effective...
May 26, 2020
10,775
0
The one thing that all CSOs have in common is that they are risk owners. No matter the situation, even during times of extreme business transition and the need to maintain operational continuity,...
Mar 26, 2020
11,401
6
Imagine what you would have done differently in your network if you could have just seen a few years into the future. Would you have been quicker to embrace the cloud? What about the time and money...
Jan 21, 2020
5,804
0
Much has been made about the cybersecurity skills gap, and for good reason. There is a scarcity of cybersecurity professionals worldwide, which makes networks and those who depend on them—which is...
Nov 04, 2019
12,094
2
The need for talented IT professionals remains a top concern for most organizations. According to one recent report, organizations say they currently face skills shortages across a range of IT...
Jul 26, 2019
12,499
6
The General Data Protection Regulation (GDPR) which is celebrating its first anniversary, and the new India Data Protection Bill, provides consumers with added protections to ensure their privacy is...
May 29, 2019
16,463
1
The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6% were...
Mar 19, 2019
11,132
1