
ZTNA and the Death of the Network Perimeter
Zero trust network access (ZTNA) is becoming increasingly relevant as the concept of the network perimeter, and the traditional “castle-and-moat” mentality of cybersecurity becomes obsolete. The advent of mobile devices, Wi-Fi networks, remote work and work-from-home models, internet-of-things (IoT) devices, cloud computing, SaaS apps, and the increasing diversification of the ... Read More

ZTNA and the Death of the Network Perimeter
Tony Bradley Editor-in-Chief at TechSpective Zero trust network access (ZTNA) is becoming increasingly relevant as the concept of the perimeter, and the traditional “castle-and-moat” mentality of cybersecurity, becomes obsolete. The advent of mobile devices, Wi-Fi networks, remote work and work-from-home models, internet-of-things (IoT) devices, cloud computing, SaaS apps, ... Read More
ZTNA and the Death of the Network Perimeter
Zero trust network access (ZTNA) is becoming increasingly relevant as the concept of the perimeter, and the traditional “castle-and-moat” mentality of cybersecurity, becomes obsolete. The advent of mobile devices, Wi-Fi networks, remote work, and work-from-home models, internet-of-things (IoT) devices, cloud … ZTNA and the Death of the Network Perimeter Read ... Read More
Julie Smith Shares Identity Security Guidance for 2023
TechSpective Podcast Episode 102 Identity security is crucial for effective cybersecurity. When it comes down to it, many attacks are successful because threat actors are able to somehow steal, hack, or otherwise circumvent identity controls. The Identity Defined Security … Julie Smith Shares Identity Security Guidance for 2023 Read ... Read More

Mark Thomas Talks about Threat Hunting
TechSpective Podcast Episode 101 There are many facets to cybersecurity. Organizations seek to prevent or block as much as possible, while also constantly monitoring their environments, and–in most cases–working to detect and respond to any malicious code or behavior … Mark Thomas Talks about Threat Hunting Read More » ... Read More

Maggie MacAlpine Chats about Collaborative Threat Intel Initiative
TechSpective Podcast Episode 099 Do you like to do jigsaw puzzles? I generally don’t have the patience, but my wife is a jigsaw puzzle fanatic. Gathering threat intelligence is a lot like assembling a jigsaw puzzle. Whether you do … Maggie MacAlpine Chats about Collaborative Threat Intel Initiative Read ... Read More

Intel Outlines Focus on Innovative Security Technologies
Intel recently hosted the Innovation conference in San Jose. Innovation is focused on the developer community and provides an opportunity for attendees to learn about the latest technologies and innovative computing solutions. The event also showcased the value Intel places … Intel Outlines Focus on Innovative Security Technologies Read More ... Read More

Ahmed Masud Chats about Innovative Ways to Combat Ransomware and Protect Data
TechSpective Podcast Episode 097 Ransomware is one of the top things keeping CISOs and other company executives up at night. A Ransomware.org survey found that 83% consider the risk of getting hit by ransomware to be the same or … Ahmed Masud Chats about Innovative Ways to Combat Ransomware ... Read More

Demand for Identity Security Drives CyberArk Channel Growth
Cybersecurity is crucial for organizations, and Identity Security is the effective foundation that businesses need today . In the back-and-forth battle between threat actors and organizations, it’s essential to be able to confidently verify that individuals, devices or applications that … Demand for Identity Security Drives CyberArk Channel Growth Read ... Read More

Sam Curry Talks about Misinformation Online and ‘Doing Your Own Research’
Doing your own research makes sense. You should not believe everything you see, or read, or hear. Critical thinking is a crucial skill. It is not only fair to question information and seek out alternative perspectives to determine what is … Sam Curry Talks about Misinformation Online and ‘Doing Your ... Read More