Reactive vs. Proactive Cybersecurity: 5 Reasons Why Traditional Security No Longer Works

Security sprawl is a real challenge for most organizations, especially now as networks are expanding and evolving rapidly, and security resources are increasingly limited. If you’re like most companies, you’ve loaded your wiring closet with a hodge-podge of perimeter defenses over the years. Most of these tools operate in isolation, Continue Reading

Byline: Security Platform vs. Security Fabric

One of the challenges many organizations face when considering upgrading or expanding their security infrastructure is simply wading through the sometimes-confusing language and nomenclature being invented by security vendors and manufacturers to describe new technologies and strategies. Far too often, security tools are wrapped in marketing language that doesn’t always Continue Reading

IETF Hackathon: Getting TLS 1.3 working in the browser

Over the last few years, the IETF community has been focused on improving and expanding the use of the technical foundations for Internet security. Part of that work has been updating and deploying protocols such as Transport Layer Security (TLS), with the first draft of the latest version of TLS, Continue Reading

>