Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense

Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.

The Era of Agentic Security with Microsoft Security Copilot

In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.

The DoJ Just Devalued Juniper Mist

The proposed remedies for the HPE acquisition of Juniper Networks did a real disservice to Juniper Mist. The confusion around what’s going on with the proposed Juniper AIOps for Mist auction have professionals asking a lot of questions. In this episode, recorded on the eve of the close of the acquisition, Tom Hollingsworth sits down with Sam Clements, Jake Snyder, and Ed Weadon to make sense of it all. There are discussions about what exactly is included in the auction and what benefit will come from the license to use Juniper AIOps for Mist. Also discussed is who might be a good bidder for the solution and how long it will take for them to get any real value from it.

Enterprises Shouldn’t Be Outsourcing Their IT Anymore

Enterprise networks are complicated but outsourcing all of the operations team doesn’t lead to better outcomes. It’s important to remember that enterprise covers a wide range of network definitions. In this episode, Ed Weadon, Chris Grundemann, and Jody Lemoine join Tom Hollingsworth as they discuss how businesses see the network and IT in general as a cost center instead of value generation. They also talk about the various sizes of networks and why each of them has issues with the most popular outsourcing methods. They also discuss the human factor and why not all managed providers can give you the same level of service.

We Are Long Past Passwords

Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.

Is Cisco Live Still The Place To Be

Tom Hollingsworth recently explored whether Cisco Live continues to be a vital hub for networking professionals seeking to stay current in the ever-evolving tech landscape. He examines the event’s enduring value, focusing on its educational sessions, networking opportunities, and powerful keynote presentations. Extensive coverage of Cisco Live for over a decade by Tom Hollingsworth can be found on his blog.

MLO is a Lie

One of the most anticipated features of Wi-Fi 7 isn’t ready for the public. Worse yet, it may never deliver on the promise of fast, reliable wireless connectivity. In this episode, Tom Hollingsworth is joined by Allyn Crowe, Peter Mackenzie, and Chris Reed as they discuss the way that multi-link operation (MLO) has been included in the specification for Wi-Fi 7 yet not quite implemented. They highlight the technical difficulties of deploying such a complicated protocol and how vendors are trying to squeeze every drop of performance out of their hardware. They wrap up with advice on whether or not to plan your next deployment around a technology that isn’t quite ready yet.

User-Centric Connectivity Has to Innovate

Modern networking is being disrupted in the data center but user-facing networking has largely stagnated. Users are getting slightly faster connections but everything feels mostly the same. In this episode, Tom Hollingsworth is joined by Sam Clements and Ed Weadon as they discuss innovation in the edge of the network. They talk about how companies like Cisco have been trying to bring users into the modern era. They talk about the centralization of management in the cloud and how competition has driven those moves. They also look ahead to Cisco Live and discuss the releases they would most like to see at the event.

Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025

Hello San Diego! We’re thrilled to be back once again with great content headed your way courtesy of Tech Field Day Extra!. We’re hoping the June Gloom stays away so we can shine a light on some wonderful presenters and get some great questions from our amazing delegates. You’re not going to want to miss […]

Compliance Does Not Equal Security

Compliance reinforces the state of security in your organization. However, compliance in and of itself is not security. In this episode of the Tech Field Day Podcast, Tom Hollingsworth is joined by Jack Poller and Milou Meier as they discuss the nuance between securing your organization and ensuring compliance. They discuss the challenges with audits and the “checkbox” mentality that has become common. They also discuss how organizations face different challenges globally and how you can help ensure that you aren’t being exposed to problems in the future.

Exploring the Future of Cybersecurity at Security Field Day 13

The first Security Field Day event of the year is finally here! We’re excited to bring you Security Field Day 13 live from Silicon Valley. This event combines a number of trends in the cybersecurity and data protection spaces to bring you information you need to keep your users safe and sound. Security Field Day […]

Wi-Fi is Fast Enough

Modern Wi-Fi connections rely on more than just raw throughput to measure performance. The complexity of wireless as a medium makes the user experience more varied and creates difficulties in troubleshooting. In this episode, Tom Hollingsworth is joined by Keith Parsons, Rocky Gregory, and Ron Westfall as they discuss the state of Wi-Fi and how performance works. They talk about the challenges with properly designed wireless networks and how data sheets make assumptions about the environment. They also discuss user expectations for performance and how workflows involve many moving parts that can impact overall user experiences.

Measuring Wi-Fi 7 Outcomes Through Users

In his latest analysis, Tom Hollingsworth focuses on the potential impacts of Wi-Fi 7 technology on user experiences. He examines how the enhanced capabilities of Wi-Fi 7, such as increased speed and bandwidth, could significantly improve connectivity and productivity for users. For further insights into Wi-Fi innovations presented at Mobility Field Day 13, explore additional content by Tom Hollingsworth.

Virtual Networks are Air Gapped

The definition of traditional security technologies must evolve to meet new use cases. Networks that use virtual constructs to segregate traffic are just as air gapped as physical separation. In this episode, Tom Hollingsworth is joined by Carole Warner Reece, John Osmon, and Jason Gintert discuss why the standard for hyper secure systems has always been physical separation. They look at how the terminology is being changed to support new use cases with virtual separation and whether or not those new networks can meet the high standards of the older versions. They also discuss the need for precision in terminology and how to avoid falling back on marketing terms that can create confusion with unsuspecting consumers.

Key Takeaways from Networking Field Day 37: AI, Cybersecurity, and the Future of Networks

Tom Hollingsworth provides key insights from Networking Field Day 37, focusing on the latest advancements in AI, cybersecurity, and network technologies. He highlights how these sectors are intersecting more than ever, driving new strategies for network architecture and security. Watch this video for Tom’s overall Networking Field Day takeaways!

Meeting Community Needs With the USNUA

Tom Hollingsworth recently highlighted the impactful initiatives of the USNUA (United States Network Users Association), an organization dedicated to addressing the unique challenges and requirements of the networking community. Through collaborative efforts and shared knowledge, the USNUA aims to foster a supportive environment where practical solutions and advancements can thrive. For further insights into Networking Field Day 37, you can explore additional articles by Tom Hollingsworth on our site.

The Return of Networking Field Day

Tom Hollingsworth provides an overview of Networking Field Day 37, including presentations by BT, Versa, and Selector. He highlights the event’s focus on the latest trends in networking technology, including advances in SD-WAN, network security, and cloud networking. For a comprehensive exploration of Networking Field Day 37, see more coverage by Tom Hollingsworth on Gestalt IT.

Cisco Unveils Cloud-Native Zero-Trust Network Access Solution

At Cisco Live EMEA, Cisco introduced a new cloud-native solution for Zero-Trust Network Access, aimed at enhancing security frameworks for various organizations by leveraging cloud scalability and flexibility. This advancement underscores Cisco’s commitment to evolving cybersecurity measures by integrating more adaptive and robust access controls to protect network resources. For additional insights on this topic, explore coverage by Tom Hollingsworth on Gestalt IT.

Not All AI Infrastructure Is The Same

Enterprises require vastly different infrastructure for AI. When building your next network, you need to understand what is required in order to achieve specific outcomes. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Scott Robohn, Brad Gregory, and Ron Westfall to discuss the various different types of AI infrastructure. They talk about inferencing and models as well as how to effectively utilize what you currently have. They also discuss what to look for when buying new equipment and how best to put it to use in order to maximize return on investment.

The Return of Networking Field Day

Networking Field Day is back! One of most popular events is bringing you the latest edition with a great lineup of companies to discuss the latest in technology when it comes to moving bits back and forth. The topics will be diverse and we hope that you’re ready to strap in for the ride.