Alastair Cooke discusses Fortinet’s integrated strategy for cloud security, emphasizing their fabric-based approach designed to ensure robust security across diverse cloud environments. This method consolidates various security tools into a unified framework, enhancing visibility and control while simplifying management. Find more coverage of Cloud Field Day 24 by Cooke on Security Boulevard.
Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management
Jack Poller recently discussed 1Password’s expansion beyond its core password management capabilities, highlighting its strategic shift towards Extended Access Management. This evolution aims to provide more comprehensive security solutions that address various access control needs in an increasingly complex digital environment. For further coverage of Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.
Bridging the Trust Gap with 1Password
Tom Hollingsworth recently explored how 1Password can help bridge the trust gap in today’s security environment by providing robust password management solutions that enhance data protection and user trust. His insights point towards the increasing relevance of secure password vaults in maintaining privacy and integrity in digital transactions. For more coverage of Security Field Day 14, visit Security Boulevard.
Your Enterprise LAN Security Is a Problem—Nile Can Fix It
Tom Hollingsworth examines the significant challenges facing enterprise LAN security, highlighting how vulnerable traditional network infrastructures can be to sophisticated cyber threats. He introduces Nile, a new security solution that promises to address and mitigate these vulnerabilities effectively. For additional insights into Nile’s impact on enterprise security, visit Tom Hollingsworth’s coverage on Security Boulevard.
How HPE’s New Security Playbook Is Actually Stopping Threats
In this article following Security Field Day 14, Tom Hollingsworth examines Hewlett Packard Enterprise’s innovative approach to cybersecurity, detailing how their new security strategies are effectively mitigating threats. He highlights the integration of advanced tools and protocols that are setting new standards in the industry for protecting enterprise data assets. For additional insights into this topic, check out the coverage on Security Boulevard.
When “It’s Always DNS” Becomes Your Security Advantage
In his latest analysis, Jack Poller examines how the common adage “It’s Always DNS” can be turned into a strategic advantage for cybersecurity efforts. He discusses how DNS, typically a source of network issues, can also serve as a critical tool in identifying and mitigating security threats. For further insights about Security Field Day 14 and Infoblox, watch Security Boulevard!
The Endpoint Has Moved to the Browser — Your Security Tools Haven’t
Jack Poller discusses the shift of endpoint computing to the browser in a recent article, highlighting how traditional security tools are lagging behind in adapting to this change. He explains that as applications and user data migrate from desktops to web platforms, the paradigm for security must evolve to address new vulnerabilities and threats. This was the topic of the SquareX presentation at Security Field Day. For more coverage on this topic, follow Jack Poller on LinkedIn.
VCF 9.0 Live Patching Ends Maintenance Window Dread
Broadcom’s introduction of live patching in VCF 9.0 marks a significant advancement for system administrators by eliminating the need for maintenance windows, thus ensuring zero downtime. This feature allows for seamless updates and patch installations without disrupting ongoing operations, enhancing system reliability and operational efficiency. For more comprehensive coverage on this topic, continue following on the Techstrong sites, including Security Boulevard.
VMware Cracks the Code: VCF 9.0 Delivers Enterprise Security Without Operational Sacrifice
VMware has introduced VCF 9.0, which significantly enhances enterprise security while maintaining operational efficiency. This new release integrates advanced security measures directly into its operational framework, ensuring that robust security is a seamless aspect of business functionality. For more coverage of the innovations in VCF 9.0, you can follow updates and analyses by Jack Poller on Security Boulevard.
Nile Gives Your Campus Network More Than Just a Password
Nile is redefining access to campus networks, not just through secure password protection but by enhancing network capabilities and user experience. Their innovative approach ensures both security and convenience, addressing key needs in educational environments. Discover additional insights from Mobility Field Day 13 by Tom Hollingsworth at Security Boulevard.
Dell’s Comprehensive Approach to AI and the Dell AI Factory
Tom Hollingsworth recently explored Dell’s sophisticated approach toward harnessing the power of AI through the introduction of the Dell AI Factory, aimed at integrating advanced AI solutions into enterprise environments. This initiative combines Dell’s technological infrastructure with smart tools to enhance operational efficiency and innovation within organizations. You can read more about Tom’s insights from Security Field Day 13 on Security Boulevard, covering this topic in greater detail.
Why Supply Chain Security Is The First Line of Defense
Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.
From Packets to Protection: How Network Observability Powers Security and Forensics
In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.
Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense
Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.
The Era of Agentic Security with Microsoft Security Copilot
In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.
Microsoft Security Copilot Gets New Tooling
Justin Warren recently discussed the introduction of new tooling for Microsoft Security Copilot, highlighting its enhanced capabilities in managing and responding to security threats more efficiently. The update includes improved AI-driven analytics and automated response features, aiming to bolster security operations for various organizational environments. Discover more coverage of the Microsoft Security showcase on the Tech Field Day website.
AI Security Got Complicated Fast. Here’s How Microsoft is Simplifying It.
Jennifer Minella discusses the complexity that AI has introduced into cybersecurity and how Microsoft is making efforts to simplify this landscape through strategic initiatives and solutions. She explains Microsoft’s approach to integrating AI security seamlessly, ensuring that its users can benefit from AI innovations without being overwhelmed by new security challenges. For more coverage of our recent Microsoft Security showcase, watch the Tech Field Day social media channels.
Transforming Security Operations With Generative AI
Following Fortinet’s presentation at Cloud Field Day, Keith Townsend explores the transformative potential of generative AI in enhancing security operations, highlighting its ability to automate and innovate protective measures. He presents insights on how this technology can significantly streamline the detection of threats and anomalies, improving the overall efficiency and responsiveness of security teams. For a more in-depth analysis and further coverage of Cloud Field Day 22, follow the Techstrong websites.
Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
Cisco is redefining network security by integrating its latest innovations, the Nexus Smart Switch and Hypershield, enhancing security measures directly within the networking hardware. This integration aims to simplify security protocols while increasing protection against an evolving landscape of cyber threats. For additional reports and insights on this topic, explore articles by Sulagna Saha at Security Boulevard.
Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior
At Security Field Day, Mitch Ashley talked about the implications of our digital footprints, illustrating how these data trails map our personal behavior intricately. He highlights the potential risks and impacts on privacy that come with the pervasive tracking of our online actions. This Security Boulevard article by Sulagna Saha shares Mitch’s insights.







