Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by automation via infrastructure-as-code (IaC). However, deploying new tools creates new attack surfaces, and IaC is no different.
Watch Now
Network infrastructure and operations teams and information security teams are not natural partners, but they need to learn how to be. Today, 75% of enterprises have seen an increase in the amount of collaboration that takes place between the network teams and security teams. Unfortunately, only 39% of enterprises have been fully successful with efforts to improve collaboration between these teams.
Watch Now
IoT deployments cause constant security concern, due to their frequent use as attack vectors for bad actors to gain access to broader network resources. Traditional security measures relying on agents and software updates pose challenges to manage and control on always-on, open IoT devices.
Watch Now
Light Reading
5G is the buzz. Everyone involved in the large telecommunications ecosystem is developing, trialing, promising and dreaming about 5G networks. While this technology comes with great promises and applications, we seldom hear about the underlying physical network that will have to transport the data to the 5G radios. That’s right, the optical fiber network that has been installed and optimized for other applications (e.g., FTTx, Remote PHY) will now need to reach deeper with possibly more stringent requirements.
Watch Now