Networking Mailing Lists
Author Archives: David Balaban
Zooming Into Zero Trust Network Access (ZTNA) Philosophy
Zero Trust allows IT professionals to maintain a high level of security despite the extending boundaries of the network perimeter due to the increased use of cloud and remote work.
Container Security Best Practices
A specialist responsible for container security should have an understanding of the infrastructure and proficiency in Linux and Kubernetes.
Practicing DevSecOps: Source Code Security Analysis
Developers need to think not only about the security of the digital infrastructure in use but also about the security of the code.
Public Cloud Security Considerations
Who is responsible for infrastructure security in the public cloud? What instruments do users have to control the cloud service provider? How do you know whether you can trust a provider? Let us try to figure out the answers.
Introduction Into Insider Threat and Mitigation Best Practices
Your staff members may fail to notice how they expose their business to security risks. Beware of the most common insider threats and learn how to resist.
And Again, About 5G Network Security
The security of 5G networks should encompass joint efforts of mutually trusting parties including standards developers, regulators, vendors, and service providers.