There was a total of $38.5 million in SD-WAN revenue during the first quarter of 2017.
The Actility investment is part of a $75 million Series D funding round.
Blockchain could change transactions the way the Internet changed communications.
Continue reading "Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever"
The post Worth Reading: World IPv6 Report appeared first on rule 11 reader.
Pivotal is a customer.
A key driver for SD-WAN is that it can be used to intelligently optimize and secure connections to the cloud.
Peter Welcher reflects on what he learned while troubleshooting recent WLAN performance issues.
The DevOps movement has sometimes fallen short when it comes to security. DevSecOps hopes to change that.
SDN and NFV are necessary to make 5G use cases viable
Today I can tell you who the first speakers in the autumn 2017 network automation online course will be.
Sounds promising? Why don’t you register before we run out of early-bird tickets?
I have often wondered why the “security as an enabler” model is as unique as unicorns in the wild. I think the logic works in a vacuum and it would be great if it held true. However when humans and politics (layer 8 stuff) come into the mix, it seems that the cybersecurity team tend to be viewed as the naysayers that block progress. Quite honestly, the “security as an enabler” mantra only seems to work for those organizations that are directly profiting from the sale of cybersecurity. Those that understand the role cybersecurity plays in a typical organization realize that this is unfortunate.
With this thought in mind, I was reading through an article about the traits of CEO’s and found identified points that I think contribute to these challenges for information security:
By no means am I criticizing CEO’s for these traits—they are primary contributors to keeping a given business relevant in its industry. I’m just using these to help explain the fallacy of a “security as an enabler” mindset within a given organization.
CEO’s are the highest single point of authority within an organization. They often appoint CSO’s (Chief Security Officers) or CISO’s Continue reading