Cisco Systems Inc. held its annual Partner Summit this week in Las Vegas, bringing together thousands of global partners to exchange ideas and learn about the networking giant’s most recent innovations. Cisco has one of the largest and most diverse partner ecosystems in the information technology industry, with about 90% of the company’s revenue flowing through its partners from more than 150 countries.
Tag: cybersecurity
The term XDR, for extended detection and response, has been bandied about for almost half a decade. I believe I was the first analyst to use it when I authored this post in 2018. When I wrote the post, I had a very specific definition in mind, but like most things in tech, once a term starts to gain traction, more and more vendors bend the definition to meet their needs.
Read More About
What’s XDR? Five answers to key questions about extended detection and response
The concept of DevSecOps is simple: By integrating security into the DevOps process, businesses introduce security earlier in the software development lifecycle, enabling cyber protection to “shift left,” reducing risks and eliminating costly rework.
Read More About
Zscaler integration with Hashicorp enables DevSecOps to automate security posture
Over the past couple of years there has been a significant focus on phishing, ransomware and other threats that attack online users. While this focus is certainly prudent given the rise in those types of activities, it’s important to not take your eye off more “traditional” type attacks, such as distributed denial of service (DDoS).
Read More About
Report: Cybercriminals Use Cloud for DDoS Attacks
Ransomware is on the rise and it’s coming from multiple sources. Additionally, whether the goal is to collect ransom for data or disrupt a company’s supply chain, these attacks are growing in sophistication.
Zscaler is a security company that closely follows existing and emerging cyberthreats. Zscaler’s Zero Trust Exchange is a security cloud that processes more than 200 billion transactions and 150 million blocked attacks daily. This integrated platform of services protects users and workloads using zero trust, which involves applying security policies to control access.