
This is Not Your Father’s VPN
To many, VPNs seem unremarkable and haven’t changed much in the past decade. A VPN is a VPN is a VPN. Some even think that VPNs are hardly necessary with the rise of building encryption directly into email, browsers, applications and cloud storage. The reality is that—especially for small and ... Read More

Nebulous Security Visibility Needs 3 Vantage Points
Most of cybersecurity is based on having visibility of security events and providing protection ranging from preventing the action from being executed as it is being found to alerting the security team of a threat in progress. Endpoint protection, or now endpoint detection and response (EDR), has existed since the ... Read More

Encrypted Traffic Analysis Will Be Mandatory Soon
 Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance bottlenecks and introduce potential privacy and compliance issues if the traffic is ... Read More