
Search > control application


Defining endpoint security in a zero-trust world

Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint Security

CISOs: Self-healing endpoints key to consolidating tech stacks, improving cyber-resiliency

Getting results from your zero-trust initiatives in 2023

Red Hat gives an ARM up to OpenShift Kubernetes operations

Making security invisible with adaptive access management

5 ways endpoints are turbocharging cybersecurity innovation

Defensive vs. offensive AI: Why security teams are losing the AI war

How leading endpoint security providers compare on enterprise performance

Why next-generation firewalls will be essential to a zero-trust world

Protecting your organization from rising software supply chain attacks

Report: 62% of retailers’ cybersecurity incidents come from automated threats

Guest
The beautiful intersection of simulation and AI

UltraSense uses machine learning to make better touch controls in cars

Why the manufacturing sector must make zero trust a top priority in 2023

Guest
Why doubling down on IT investment is especially critical now

How Honeywell is bridging gaps in legacy OT, IT and industrial control systems for manufacturers

The quandary of Kubernetes: How Rafay is helping curb cloud spending

Where CISOs rely on AI and machine learning to strengthen cybersecurity

Guest
What ‘Everything as Code’ is and why it matters

Why Kubernetes security challenges call for a zero-trust strategy

How zero-trust methods thwart malicious hackers

Zero trust is too trusting: Why ZTNA 2.0 won’t be

How to secure an expanding landscape of endpoints and identities

How Vanta’s access review tool reduces security gaps with automation

greymatter.io Simplifies Modern Application Networking Platform

Guest
T-ray technology is moving from sci-fi to mainstream

U.S. Army chooses Google Workspace to bring zero trust to the multicloud

Why web apps are one of this year’s leading attack vectors

How zero-trust segmentation keeps cyberbreaches from spreading across the enterprise

Palo Alto Networks and Telus partner to redefine 5G security in Canada

greymatter.io Named a “Leader” in Service Mesh by GigaOm

Community
The uncomfortable truth about operational data pipelines

Why web apps need to improve secure service access

Talon Cyber Security secures remote working with an enterprise browser

Guest
Web3: The hope for protocols over platforms

AWS re:Inforce details how to fortify enterprise security culture and tools

What is a data center? Definition, architecture and management best practices
