Sulagna Saha discusses the critical nature of maintaining up-to-date password policies as a fundamental aspect of cyber hygiene in her latest article on Security Boulevard. She emphasizes the risks associated with outdated policies, including increased vulnerability to breaches and cyber attacks. These insights came from a delegate roundtable discussion at Security Field Day 12; for more, read Sulagna Saha’s coverage on Security Boulevard.
Citrix’s Zero-Trust Revolution: Secure Access for the Modern Enterprise
Ivan McPhee delves into how Citrix is leading a zero-trust security revolution, focusing on providing secure access solutions tailored for the modern enterprise. He discusses the transformation of traditional network security paradigms to meet today’s hybrid work environments and the increasing need for robust cybersecurity measures. McPhee highlights Citrix’s strategic approach to implementing zero-trust principles across its network, ensuring that access is rigorously authenticated, strictly controlled, and continuously verified. Read more in this LinkedIn Pulse article inspired by the Citrix presentation at Security Field Day 12!
Security Field Day 12- Citrix Secure Private Access & Beyond!
Girard Kavelines provides a detailed analysis of Citrix’s presentation at Security Field Day 12, focusing on their Secure Private Access solutions and future cybersecurity strategies. He emphasizes Citrix’s commitment to enhancing secure access in hybrid work environments, ensuring that security scales with business needs without compromising user experience. Kavelines also highlights upcoming innovations that Citrix is set to implement, aiming to streamline security processes and strengthen defenses against evolving threats. Read more in this LinkedIn Pulse article inspired by the Citrix presentation at Security Field Day 12!
DigiCert: Pioneering Digital Trust in an Interconnected World
Ivan McPhee writes about DigiCert, which is at the forefront of providing essential digital trust solutions, ensuring secure connections for over 28 billion web interactions daily and gaining the confidence of 89% of Fortune 500 companies. The company presents a holistic platform tailored to manage the myriad challenges in digital trust spanning device, software, content, enterprise, and DNS security. With a proactive approach towards rising threats such as quantum computing and AI-generated content, DigiCert is dedicated to maintaining the authenticity and integrity of digital interactions in a rapidly evolving interconnected landscape. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12!
New Capabilities With Plenty of Citrix Heritage
Alastair Cooke recently discussed the evolving landscape of Citrix solutions, emphasizing the introduction of new capabilities while retaining the core heritage that many IT professionals trust. He explores how these advancements align with current enterprise needs, enhancing both functionality and user experience. Cooke’s insights highlight the importance of innovation balanced with reliable performance in Citrix’s offerings. Read more in this LinkedIn Pulse article inspired by the Citrix presentation at Security Field Day 12!
Dell Security Evolution: Security Field Day Insights
Marian Newsome recently shared insights from the Dell Security Evolution event at Security Field Day. In her update, she highlights Dell’s strategic enhancements in cybersecurity solutions aimed at addressing the evolving landscape of enterprise security needs. Newsome effectively outlines Dell’s commitment to integrating advanced security technologies to protect data across various IT environments. Read more in this LinkedIn Pulse article inspired by the Dell Security presentation at Security Field Day 12!
DigiCert’s Digital Trust Warning: When 50% of Certificates Vanish
Marian Newsome recently highlighted a critical cybersecurity alert from DigiCert regarding the potential disappearance of 50% of digital certificates due to lapses in digital trust management. This situation underscores the urgent need for organizations to bolster their certificate lifecycle practices to prevent significant disruptions in business operations and data security. Newsome emphasizes the importance of automated solutions and robust policy enforcement in maintaining the integrity and reliability of digital certificates. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12!
Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense
Sulagna Saha provides an in-depth analysis of Dell’s comprehensive approach to cybersecurity, emphasizing the company’s initiatives to fortify its systems against external threats. By focusing on sealing potential entry points and strengthening weak links within their infrastructure, Dell aims to construct a robust defense mechanism akin to an iron wall. Saha elaborates on the technologies and strategies Dell employs to ensure data integrity and safeguard against increasingly sophisticated cyber threats. Read more in this Security Boulevard article following the Dell presentation at Security Field Day 12.
Citrix Boosts Security for Remote Application Accesses With “More Security Layers”
Citrix has enhanced the security features of its remote application access services by introducing additional security layers. These improvements are designed to safeguard sensitive corporate data and applications from emerging cyber threats, particularly in today’s shift towards remote work environments. The new security measures include advanced authentication options and more robust encryption protocols, aiming to provide a safer and more reliable user experience. Read more in this Security Boulevard article by Sulagna Saha following the Citrix presentation at Security Field Day 12.
PP037: From Supply Chain Security to Post-Quantum Cryptography – Live from XFD!
In this episode of PacketPushers Podcast, Drew Conry-Murray and Jennifer Minella provide in-depth coverage on the pressing issues of supply chain security and the evolving field of post-quantum cryptography, recorded live from Security Field Day 12. Highlighting expert insights, the discussion delves into strategies for fortifying supply chains against emerging threats and the importance of advancing cryptographic methods in anticipation of quantum computing capabilities. Their comprehensive analysis offers listeners actionable information to enhance their cybersecurity measures in an increasingly complex digital landscape.
DigiCert – It’s a Matter of Trust
In her latest article for Security Boulevard, Sulagna Saha explores how DigiCert has become synonymous with trust in the digital certificate space. She delves into their advanced security solutions that not only enhance cryptographic infrastructure but also ensure seamless compliance with evolving global standards. Saha highlights DigiCert’s role in building a more secure internet through continuous innovation and dedication to privacy and reliability. This article was inspired by the DigiCert presentation at Security Field Day 12.
SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection
In this article for Security Boulevard, Sulagna Saha discusses SonicWall’s strategic enhancement to their edge security solutions. The update focuses on implementing risk-based connectivity and enhanced threat protection, aiming to provide robust security measures amid increasing network threats. SonicWall’s initiative underscores its commitment to evolving security needs by integrating advanced technology to safeguard perimeter networks effectively. Read all of Sulagna’s Security Field Day coverage at Security Boulevard!
Citrix Does ZTNA? Here’s What I Learned
Drew Conry-Murray explores Citrix’s entry into the Zero Trust Network Access (ZTNA) space, highlighting the company’s strategic move to enhance security and adapt to modern cybersecurity needs. He delves into the functionalities Citrix offers, comparing its solutions against the competing market to inform readers on how effectively Citrix integrates ZTNA with its existing network and cloud services. Conry-Murray provides an insightful analysis for those interested in understanding the evolving landscape of enterprise security and how traditional network vendors are transitioning into this newer model of network access. Read more in this article for PacketPushers following the Citrix presentation at Security Field Day 12.
Techstrong Gang – October 22, 2024
In this appearance on Techstrong TV, Stephen Foskett discussed the major thematic takeaways from Security Field Day 12: Digital Trust, Supply Chain, and SSE (Secure Services Edge). Watch Techstrong Gang every Tuesday for Foskett’s thoughts, including previews and reactions to Tech Field Day events.
Security Field Day 12 Delegate Roundtable Recap
Girard Kavelines recently participated in the Security Field Day 12, engaging in comprehensive discussions focused on the latest trends and challenges in cybersecurity. This event provided an insightful platform for industry leaders and innovators to share their expertise, strategies, and solutions for addressing complex security issues facing enterprises today. Two delegate roundtables offered an invaluable exchange of ideas, emphasizing the importance of advancing security measures and collaboration within the tech community. Read more in this LinkedIn Pulse article, describing the two roundtable discussions.
More than web server certificates, digital identity
Alastair Cooke discusses the broader implications and applications of digital identity beyond merely securing web server communications with certificates. He highlights how digital identity serves as a foundational element in enhancing security across various networking domains, from user authentication to device validation. Cooke’s discussion underscores the vital role that comprehensive digital identity strategies play in safeguarding modern digital environments. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12.
You Don’t Need Post-Quantum Crypto Yet
With the advent of quantum computers, the likelihood that modern encryption is going to be invalidated is a possibility. New standards from NIST have arrived that have ushered in the post-quantum era. You don’t need to implement them yet but you need to be familiar with them. Tom Hollingsworth is joined by JJ MInella, Drew-Conry Murray, and Alastair Cooke in this episode to discuss why post-quantum algorithms are needed, why you should be readying your enterprise to use them, and how best to plan your implementation strategy.
Understanding Security Needs at Security Field Day 12
Writing for Security Boulevard, Tom Hollingsworth looks forward to Security Field Day 12, highlighting the evolving challenges and solutions in enterprise security. He emphasizes the importance of adapting to new threats and the necessity for businesses to continually update their security strategies to protect valuable data. Look for live streaming video on October 16 and 17 and more coverage from Security Field Day on Security Boulevard.
The Brave New World of Security Field Day 12
In this Gestalt IT video, Tom Hollingsworth highlights the engaging discussions and innovative technologies to be showcased at Security Field Day 12. The event brings together thought leaders and experts from companies like Dell, SonicWall, Citrix, and Digicert to explore the latest trends in cybersecurity, focusing on the importance of proactive security measures and advanced threat detection strategies. Tune in for Security Field Day on October 16 and 17 and watch for more coverage here!