New Capabilities With Plenty of Citrix Heritage

Alastair Cooke recently discussed the evolving landscape of Citrix solutions, emphasizing the introduction of new capabilities while retaining the core heritage that many IT professionals trust. He explores how these advancements align with current enterprise needs, enhancing both functionality and user experience. Cooke’s insights highlight the importance of innovation balanced with reliable performance in Citrix’s offerings. Read more in this LinkedIn Pulse article inspired by the Citrix presentation at Security Field Day 12!


Dell Security Evolution: Security Field Day Insights

Marian Newsome recently shared insights from the Dell Security Evolution event at Security Field Day. In her update, she highlights Dell’s strategic enhancements in cybersecurity solutions aimed at addressing the evolving landscape of enterprise security needs. Newsome effectively outlines Dell’s commitment to integrating advanced security technologies to protect data across various IT environments. Read more in this LinkedIn Pulse article inspired by the Dell Security presentation at Security Field Day 12!


DigiCert’s Digital Trust Warning: When 50% of Certificates Vanish

Marian Newsome recently highlighted a critical cybersecurity alert from DigiCert regarding the potential disappearance of 50% of digital certificates due to lapses in digital trust management. This situation underscores the urgent need for organizations to bolster their certificate lifecycle practices to prevent significant disruptions in business operations and data security. Newsome emphasizes the importance of automated solutions and robust policy enforcement in maintaining the integrity and reliability of digital certificates. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12!


Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense

Sulagna Saha provides an in-depth analysis of Dell’s comprehensive approach to cybersecurity, emphasizing the company’s initiatives to fortify its systems against external threats. By focusing on sealing potential entry points and strengthening weak links within their infrastructure, Dell aims to construct a robust defense mechanism akin to an iron wall. Saha elaborates on the technologies and strategies Dell employs to ensure data integrity and safeguard against increasingly sophisticated cyber threats. Read more in this Security Boulevard article following the Dell presentation at Security Field Day 12.


Citrix Boosts Security for Remote Application Accesses With “More Security Layers”

Citrix has enhanced the security features of its remote application access services by introducing additional security layers. These improvements are designed to safeguard sensitive corporate data and applications from emerging cyber threats, particularly in today’s shift towards remote work environments. The new security measures include advanced authentication options and more robust encryption protocols, aiming to provide a safer and more reliable user experience. Read more in this Security Boulevard article by Sulagna Saha following the Citrix presentation at Security Field Day 12.


PP037: From Supply Chain Security to Post-Quantum Cryptography – Live from XFD!

In this episode of PacketPushers Podcast, Drew Conry-Murray and Jennifer Minella provide in-depth coverage on the pressing issues of supply chain security and the evolving field of post-quantum cryptography, recorded live from Security Field Day 12. Highlighting expert insights, the discussion delves into strategies for fortifying supply chains against emerging threats and the importance of advancing cryptographic methods in anticipation of quantum computing capabilities. Their comprehensive analysis offers listeners actionable information to enhance their cybersecurity measures in an increasingly complex digital landscape.


DigiCert – It’s a Matter of Trust

In her latest article for Security Boulevard, Sulagna Saha explores how DigiCert has become synonymous with trust in the digital certificate space. She delves into their advanced security solutions that not only enhance cryptographic infrastructure but also ensure seamless compliance with evolving global standards. Saha highlights DigiCert’s role in building a more secure internet through continuous innovation and dedication to privacy and reliability. This article was inspired by the DigiCert presentation at Security Field Day 12.


SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection

In this article for Security Boulevard, Sulagna Saha discusses SonicWall’s strategic enhancement to their edge security solutions. The update focuses on implementing risk-based connectivity and enhanced threat protection, aiming to provide robust security measures amid increasing network threats. SonicWall’s initiative underscores its commitment to evolving security needs by integrating advanced technology to safeguard perimeter networks effectively. Read all of Sulagna’s Security Field Day coverage at Security Boulevard!


Citrix Does ZTNA? Here’s What I Learned

Drew Conry-Murray explores Citrix’s entry into the Zero Trust Network Access (ZTNA) space, highlighting the company’s strategic move to enhance security and adapt to modern cybersecurity needs. He delves into the functionalities Citrix offers, comparing its solutions against the competing market to inform readers on how effectively Citrix integrates ZTNA with its existing network and cloud services. Conry-Murray provides an insightful analysis for those interested in understanding the evolving landscape of enterprise security and how traditional network vendors are transitioning into this newer model of network access. Read more in this article for PacketPushers following the Citrix presentation at Security Field Day 12.


Techstrong Gang – October 22, 2024

In this appearance on Techstrong TV, Stephen Foskett discussed the major thematic takeaways from Security Field Day 12: Digital Trust, Supply Chain, and SSE (Secure Services Edge). Watch Techstrong Gang every Tuesday for Foskett’s thoughts, including previews and reactions to Tech Field Day events.


Security Field Day 12 Delegate Roundtable Recap

Girard Kavelines recently participated in the Security Field Day 12, engaging in comprehensive discussions focused on the latest trends and challenges in cybersecurity. This event provided an insightful platform for industry leaders and innovators to share their expertise, strategies, and solutions for addressing complex security issues facing enterprises today. Two delegate roundtables offered an invaluable exchange of ideas, emphasizing the importance of advancing security measures and collaboration within the tech community. Read more in this LinkedIn Pulse article, describing the two roundtable discussions.


More than web server certificates, digital identity

Alastair Cooke discusses the broader implications and applications of digital identity beyond merely securing web server communications with certificates. He highlights how digital identity serves as a foundational element in enhancing security across various networking domains, from user authentication to device validation. Cooke’s discussion underscores the vital role that comprehensive digital identity strategies play in safeguarding modern digital environments. Read more in this LinkedIn Pulse article inspired by the DigiCert presentation at Security Field Day 12.


You Don’t Need Post-Quantum Crypto Yet

With the advent of quantum computers, the likelihood that modern encryption is going to be invalidated is a possibility. New standards from NIST have arrived that have ushered in the post-quantum era. You don’t need to implement them yet but you need to be familiar with them. Tom Hollingsworth is joined by JJ MInella, Drew-Conry Murray, and Alastair Cooke in this episode to discuss why post-quantum algorithms are needed, why you should be readying your enterprise to use them, and how best to plan your implementation strategy.


Understanding Security Needs at Security Field Day 12

Writing for Security Boulevard, Tom Hollingsworth looks forward to Security Field Day 12, highlighting the evolving challenges and solutions in enterprise security. He emphasizes the importance of adapting to new threats and the necessity for businesses to continually update their security strategies to protect valuable data. Look for live streaming video on October 16 and 17 and more coverage from Security Field Day on Security Boulevard.


The Brave New World of Security Field Day 12

In this Gestalt IT video, Tom Hollingsworth highlights the engaging discussions and innovative technologies to be showcased at Security Field Day 12. The event brings together thought leaders and experts from companies like Dell, SonicWall, Citrix, and Digicert to explore the latest trends in cybersecurity, focusing on the importance of proactive security measures and advanced threat detection strategies. Tune in for Security Field Day on October 16 and 17 and watch for more coverage here!