POPULARITY
What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3
What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3
Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »
Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »
Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »
Jason and I take a peek forward at what we imagine IT security looks like in 2030. Topics include PQC, ZTNA, "green zones," deep fakes, IoT, connected cars, agentic AI, blockchain, and CLM.
In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power
In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power
In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115
In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115
Welcome to the Identity at the Center podcast! In this episode, hosts Jeff and Jim dive deep into modern identity architecture with guest Ian Glazer. They discuss topics such as the importance of policy, data orchestration, and the evolving landscape of identity and access management (IAM). Ian shares his thoughts on the future of IAM, the integration of various data sources, the role of events in IAM, and the potential for real-time identity solutions. They also touch on upcoming conferences, the European Identity and Cloud Conference 2025, and the significance of engaging with the identity community. Tune in for a thought-provoking discussion on the advancements and future directions of digital identity! Chapters 00:00 Introduction and Podcast Overview 00:11 Upcoming Plans and Challenges 01:03 Guest Invitation and Podcast Dynamics 03:31 Conference Announcements and Discounts 06:05 Welcoming the Guest: Ian Glazer 06:46 Fido Feud and Conference Experiences 16:29 Identity Market Trends and Innovations 19:19 Modern Identity Architectures 33:51 Identity First Security: A New Approach 34:50 Unified Data Tiers: Breaking Down Silos 36:14 Modern IAM: Opportunities and Challenges 37:02 Ephemeral Access and Zero Standing Privilege 39:18 Understanding Identity Data 41:30 Workforce Identity Data Platforms 47:14 Orchestration and Execution in IAM 51:09 Real-Time Event-Based Identity Systems 54:45 Future Directions and Community Engagement 59:03 Teaching and Sharing Knowledge 01:05:33 Closing Thoughts and Recommendations Connect with Ian: https://www.linkedin.com/in/iglazer/ Notional architecture for modern IAM: Part 3 of 4 (blog): https://weaveidentity.com/blog/notional-architecture-for-modern-iam/ 2025: The year we free our IAM data: https://weaveidentity.com/blog/2025-the-year-we-free-our-iam-data/ Learn more about Weave Identity: https://weaveidentity.com/ Digital Identity Advancement Foundation: https://digitalidadvancement.org/ Avoid the Noid! - https://en.wikipedia.org/wiki/The_Noid Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Keywords: IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Ian Glazer, Weave Identity, Identity and Access Management, IAM, Modern Identity Architectures, Modern IAM, Data Tier, Events, Orchestration, Zero Trust, ZTNA, Shared Signals Framework, EIC, Gartner, Black Hat, RSA, Identibeer, Data Lake, OIDs, IANS
Alkira provides a Multi-Cloud Networking Service (MCNS) that lets you connect public cloud and on-prem locations using a cloud-delivered, as-a-service approach. But Alkira offers more than just multi-cloud connectivity. On today’s sponsored episode of Heavy Networking, we dig into Alkira’s full set of offerings, which include networking, visibility, governance, and security controls such as firewalls... Read more »
Alkira provides a Multi-Cloud Networking Service (MCNS) that lets you connect public cloud and on-prem locations using a cloud-delivered, as-a-service approach. But Alkira offers more than just multi-cloud connectivity. On today’s sponsored episode of Heavy Networking, we dig into Alkira’s full set of offerings, which include networking, visibility, governance, and security controls such as firewalls... Read more »
Alkira provides a Multi-Cloud Networking Service (MCNS) that lets you connect public cloud and on-prem locations using a cloud-delivered, as-a-service approach. But Alkira offers more than just multi-cloud connectivity. On today’s sponsored episode of Heavy Networking, we dig into Alkira’s full set of offerings, which include networking, visibility, governance, and security controls such as firewalls... Read more »
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
Take a Network Break! This week we discuss a new ZTNA offering from NaaS startup Alkira, a serious vulnerability in Fortinet’s management software under active exploit, and a less-serious vulnerability in Cisco security software that’s also being exploited. Gluware adds new AI copilots to its network automation software, a judge orders Broadcom to continue to... Read more »
Take a Network Break! This week we discuss a new ZTNA offering from NaaS startup Alkira, a serious vulnerability in Fortinet’s management software under active exploit, and a less-serious vulnerability in Cisco security software that’s also being exploited. Gluware adds new AI copilots to its network automation software, a judge orders Broadcom to continue to... Read more »
Take a Network Break! This week we discuss a new ZTNA offering from NaaS startup Alkira, a serious vulnerability in Fortinet’s management software under active exploit, and a less-serious vulnerability in Cisco security software that’s also being exploited. Gluware adds new AI copilots to its network automation software, a judge orders Broadcom to continue to... Read more »
In this episode, host Raghu Nandakumara sits down with Stephen J. White, the CEO of Viking Technology Advisors to discuss the critical role of Zero Trust Network Access (ZTNA), cloud adoption, and AI in modernizing network security. He emphasizes the importance of visibility, automation, and holistic approaches to enhance operational efficiency and security.--------“It's about making security the enabler for Google, like you just said, it is the enabler, but then it's also making it invisible to the user community, so that it's secured, controlled, managed, but they can do their jobs as effectively no matter where they are. And it's just, this is a really pivotal time." - Steve White--------Time Stamps (04:42) The security challenges of modernization(17:29) Connecting business and security outcomes (29:02) Should cybersecurity and network teams merge? (31:01) What will generative AI bring to security?(49:31) The borderless network and managing the perimeter --------SponsorAssume breach, minimize impact, increase resilience ROI, and save millions in downtime costs — with Illumio, the Zero Trust Segmentation company. Learn more at illumio.com.--------LinksConnect with Stephen on LinkedIn
Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Fortinet's Unified SASE provides consistent security controls and policies both for traditional campuses and the hybrid workforce.. Nirav Shah joins us to explain how Fortinet is positioned to do this: a foundational software developed for 20 years, a network of over 140 POPs, a security lab with over 1,000 researchers, continuous ZTNA verification proxies, and... Read more »
Fortinet's Unified SASE provides consistent security controls and policies both for traditional campuses and the hybrid workforce.. Nirav Shah joins us to explain how Fortinet is positioned to do this: a foundational software developed for 20 years, a network of over 140 POPs, a security lab with over 1,000 researchers, continuous ZTNA verification proxies, and... Read more »
Fortinet's Unified SASE provides consistent security controls and policies both for traditional campuses and the hybrid workforce.. Nirav Shah joins us to explain how Fortinet is positioned to do this: a foundational software developed for 20 years, a network of over 140 POPs, a security lab with over 1,000 researchers, continuous ZTNA verification proxies, and... Read more »
Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure access to web and SaaS applications, particularly for environments reliant on Linux thin clients, which are already locked down by design and managed by thin client vendors.This release, currently available as a private tech preview, comes packed with powerful features that are waiting for you to explore. As part of this preview, let's dive into its advanced capabilities, particularly in the context of enhanced security for Linux thin clients:Host: Andy WhitesideCo-host: Bill SuttonCo-host: Geremy MeyersCo-host: Monica Griesemer
Building upon the robust security of Linux thin clients, Citrix is thrilled to announce the expansion of its Enterprise Browser offerings to Linux, marking a significant step in our access security platform expansion strategy. This empowers organizations to further secure access to web and SaaS applications, particularly for environments reliant on Linux thin clients, which are already locked down by design and managed by thin client vendors.This release, currently available as a private tech preview, comes packed with powerful features that are waiting for you to explore. As part of this preview, let's dive into its advanced capabilities, particularly in the context of enhanced security for Linux thin clients:Host: Andy WhitesideCo-host: Bill SuttonCo-host: Geremy MeyersCo-host: Monica Griesemer
In this episode we are looking at why people are moving away from Virtual Private Networks, or VPNs, and are navigating towards Zero Trust Network Access, or ZTNAs.VPNs have largely been unchallenged as the go-to cyber security option for organisations since they first came about in the mid-1990s. However, they do have security flaws which have been exploited by hackers and cyber criminals, leading many to ask whether there's a more secure solution.Joining us to discuss why ZTNA is becoming a more popular security option for organisations is Jaye Tillson, HPE's Director of Strategy in Cyber Security.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About the expert: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk Sources and statistics cited in this episode:No more Chewy Cnetres: https://www.forrester.com/report/No-More-Chewy-Centers-The-Zero-Trust-Model-Of-Information-Security/RES56682Revenue generated by the virtual private network (VPN) market worldwide: https://www.statista.com/statistics/542817/worldwide-virtual-private-network-market/ Statistics on ZTNA market share: https://www.kuppingercole.com/press-release/market-sizing-ztnaForbes report on VPN data leaks: https://www.forbes.com/advisor/business/vpn-statistics/ICS2 report on users' cloud security fears: https://www.statista.com/statistics/1172265/biggest-cloud-security-concerns-in-2020/ “String Quartet No. 1, 'Polar Energy Budget.”: https://www.youtube.com/watch?v=Tulsx2wt3qUComposing music from climate data: https://www.cell.com/iscience/fulltext/S2589-0042(24)00844-7?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2589004224008447%3Fshowall%3Dtrue
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode we are looking at why people are moving away from Virtual Private Networks, or VPNs, and are navigating towards Zero Trust Network Access, or ZTNAs.VPNs have largely been unchallenged as the go-to cyber security option for organisations since they first came about in the mid-1990s. However, they do have security flaws which have been exploited by hackers and cyber criminals, leading many to ask whether there's a more secure solution.Joining us to discuss why ZTNA is becoming a more popular security option for organisations is Jaye Tillson, HPE's Director of Strategy in Cyber Security.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About the expert: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk Sources and statistics cited in this episode:No more Chewy Cnetres: https://www.forrester.com/report/No-More-Chewy-Centers-The-Zero-Trust-Model-Of-Information-Security/RES56682Revenue generated by the virtual private network (VPN) market worldwide: https://www.statista.com/statistics/542817/worldwide-virtual-private-network-market/ Statistics on ZTNA market share: https://www.kuppingercole.com/press-release/market-sizing-ztnaForbes report on VPN data leaks: https://www.forbes.com/advisor/business/vpn-statistics/ICS2 report on users' cloud security fears: https://www.statista.com/statistics/1172265/biggest-cloud-security-concerns-in-2020/ “String Quartet No. 1, 'Polar Energy Budget.”: https://www.youtube.com/watch?v=Tulsx2wt3qUComposing music from climate data: https://www.cell.com/iscience/fulltext/S2589-0042(24)00844-7?_returnURL=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS2589004224008447%3Fshowall%3Dtrue
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.Business and IT Transformation in the Digital AgeThe conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and SecurityOne of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.Bridging the Gap Between IT and Security TeamsTim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.Real-World Use Cases and Success StoriesThroughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.Looking Towards a Secure FutureAs businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.Learn more about Open Systems: https://itspm.ag/opensystems-d11Note: This story contains promotional content. Learn more.Guest: Tim Roddy, Vice President Marketing, Open Systems [@RealOpenSystems]On LinkedIn | https://www.linkedin.com/in/troddy/ResourcesLearn more and catch more stories from Open Systems: https://www.itspmagazine.com/directory/open-systemsView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Is the VPN a security technology? Should businesses still use that risky technology? How can an organization move off that old tech? Where do VPN's fit into Zero Trust? Xage Co-Founder gives some great insights here.
Zero Trust Network Access, or ZTNA, is a core element of a Security Service Edge because it enables secure remote access to on-prem and cloud-based applications. On today's episode, sponsored by HPE Aruba Networking, we dig into ZTNA from HPE's perspective and hear customer stories on how it's being used for third-party access, VPN consolidation,... Read more »
Zero Trust Network Access, or ZTNA, is a core element of a Security Service Edge because it enables secure remote access to on-prem and cloud-based applications. On today's episode, sponsored by HPE Aruba Networking, we dig into ZTNA from HPE's perspective and hear customer stories on how it's being used for third-party access, VPN consolidation,... Read more »
Zero Trust Network Access, or ZTNA, is a core element of a Security Service Edge because it enables secure remote access to on-prem and cloud-based applications. On today's episode, sponsored by HPE Aruba Networking, we dig into ZTNA from HPE's perspective and hear customer stories on how it's being used for third-party access, VPN consolidation,... Read more »
VMware by Broadcom's VP & General Manager for SD-WAN and SASE, Abe Ankumah, shares why managing security, performance, and complexity at the edge is crucial as users, applications, and environments become more distributed. Combining SD-WAN, SASE, ZTNA, and zero-trust principles ensures comprehensive edge security. How can organizations best prepare their edge infrastructure for the future... Read More The post Software-Defined Edge: Unraveling Complex Distributed Environments appeared first on MEF.
On this episode of the Security Visionaries podcast host Max Havey engages in a fascinating discussion with Steve Riley, former Gartner analyst and Field CTO at Netskope and Carl Smittle, Network Engineer for Charter Communications, about the history, significance, and future of virtual private networks (VPNs). Understand how VPNs revolutionized businesses, and how the advent of zero trust network access (ZTNA) shows a potential replacement for VPNs, as Steve and Carl provide advice for organizations looking to take the next step as they retire their existing appliances.
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware’s customers may jump ship after the Broadcom acquisition completes. Arista touts a strong third quarter, while F5 forecasts a... Read more »
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware's customers may jump ship after the Broadcom acquisition completes. We cover these stories and more in today's Network Break podcast. The post NB455: Extreme Announces ZTNA Offering; Palo Alto Networks Spends Big On A Browser Startup appeared first on Packet Pushers.
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware’s customers may jump ship after the Broadcom acquisition completes. Arista touts a strong third quarter, while F5 forecasts a... Read more »
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware's customers may jump ship after the Broadcom acquisition completes. We cover these stories and more in today's Network Break podcast. The post NB455: Extreme Announces ZTNA Offering; Palo Alto Networks Spends Big On A Browser Startup appeared first on Packet Pushers.
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware's customers may jump ship after the Broadcom acquisition completes. We cover these stories and more in today's Network Break podcast. The post NB455: Extreme Announces ZTNA Offering; Palo Alto Networks Spends Big On A Browser Startup appeared first on Packet Pushers.
Extreme Networks is jumping into Zero Trust Network Access, Palo Alto Networks is reportedly spending more than half a billion dollars to acquire a corporate browser startup, and Forrester predicts as much as 20% of VMware’s customers may jump ship after the Broadcom acquisition completes. Arista touts a strong third quarter, while F5 forecasts a... Read more »
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more. The post Heavy Networking 703: Integrating ZTNA And SASE With Palo Alto Networks (Sponsored) appeared first on Packet Pushers.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more. The post Heavy Networking 703: Integrating ZTNA And SASE With Palo Alto Networks (Sponsored) appeared first on Packet Pushers.