
Establishing the Zero-Trust Cybersecurity Framework
The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.

Cognitive WiFi is here
Last August 2019, Arista made its first acquisition, Mojo Networks, to transform the future of WiFi and campus networks.

How to secure your online brand
How adversaries impersonate an organization’s online brand to target customers or employees. As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business.
A day in the life of a Presales Consultant
As Head of Technology & Solutions I have a large remit within the business but I am often asked what I and my team 'do'... And sometimes I struggle to explain it to my family and friends too so I thought I'd take some time to explain the pre-sales role in particular. Here's an actual day in the life of a presales consultant!
Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT
Juniper Networks announced that they've has entered into a definitive agreement to acquire Mist Systems, a pioneer in cloud-managed wireless networks powered by Artificial Intelligence (AI).

Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro
What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.

F5 Networks
F5 Acquires NGINX
F5 and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of approximately $670 million.

Juniper Networks
Juniper announces end of life of popular EX Switches
Juniper Networks has announced the End of Life (EOL) of some of their most popular, but older, switches including: EX2200, EX3300, EX4220, EX4550.

5G
5G security: Challenges to overcome enabling new business models
As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.

Half of top 12 global exploits targeted IoT devices
Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.

ETSI releases IoT security standard
The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.

5G
Why network slicing will lead to 5G readiness
Blog on 5G Network Slicing and the three categories: 1) Enhanced Mobile Broadband (eMBB), 2) Ultra-reliable and Low-latency Communications (uRLLC), and 3) Massive Machine Type Communications (mMTC).

CrowdStrike
Crowdstrike publishes Global Cyber Threat Report 2019
Crowdstrike addresses the quickening pace and increasing sophistication in adversary tactics, techniques and procedures (TTPs) in Cyber Threat 2019 report

Palo Alto Networks
Palo Alto Networks Announces Intent to Acquire Demisto
Planned acquisition expands analytics and automation capabilities; enables company to continue accelerating its Application Framework strategy.

Juniper Networks expedites 5G Transformation for Service Providers
Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008

Palo Alto Networks
Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series
The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,

Another coding example that turned into a malicious threat
Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.

SD-WAN Zero Touch Provisioning
Zero Touch Provisioning - What is it and is it useful for me?
Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, routers, NFV platforms and firewalls.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.

