Shane Buckley, CEO of Gigamon, discusses the recent CrowdStrike outage, plus insights on how Gigamon managed to restore critical systems rapidly. He highlights the importance of observability and defense-in-depth strategies in mitigating security threats and offers advice for other organizations.
Network security threats are ever-evolving, and all types of organizations work hard to face down emerging threats while maintaining robust performance across their hybrid cloud infrastructure. In this quest, Gigamon stands out as a critical ally.
Chief Information Security Officers (CISOs) face unprecedented challenges in their efforts to protect their organizations against a rising tide of increasingly sophisticated cyberthreats.
Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.
This guide is for ITOps and engineering leaders and practitioners who want to lower the cost of unplanned downtime. Learn why Splunk customers like Lenovo, Puma and Rappi lean on observability as a critical platform for modern software development and discover how an observability practice can improve digital...
Tool sprawl was an issue before digital transformation and the move to modernization. But now the challenge is amplified, says Jay Livens of Dynatrace. But there is an alternative to tool sprawl, Livens says. He describes a new approach to managing cybersecurity solutions.
Not so long ago, security organizations rallied behind best of breed security solutions. But now, trying to reduce tech debt, rationalize tools and consolidate vendors, there is a push for the platform approach. Cisco's Amilcar Alfaro talks about how to tap into the platform advantage.
Executives and board members always want the answer to be “yes,” but CISOs know it’s irresponsible to make such a blanket statement. An adversary could be any potential threat — whether external or internal, intentional or unintentional. So, the question CISOs should be answering is: “Are we...
In a world where the adversary has historically had the upper hand, Cortex and IBM have partnered together to flip the script for their clients by combining best in breed technology with extraordinary services.
Palo Alto Networks and IBM today announced that IBM Security's X-Force will use Palo Alto Networks'...
Ngrok has closed a $50 million Series A round to provide enterprise-grade authentication and user and session observability without adding complexity for developers or users. Ngrok will use the proceeds to support additional authentication protocols and build out integrations and connections.
Resiliency is a core topic in OWASP's Mobile Application Security Verification Standard. What's key context to know? Dan Shugrue of Digital.ai discusses how to deepen a DevSecOps program by training developers in code obfuscation, anti-tamper, RASP and monitoring.
Security, observability and search vendor Elastic will shrink its workforce by 13% due to small and medium businesses reducing their purchases amid the economic downturn. Elastic will lay off nearly 400 of its 3,056 employees as it adopts an automated, low-touch motion for SMB customers.
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.