
Connectivity and Access, Unified Communications, Disaster Recovery, Security, Cloud and Infrastructure Services

Recommended security resources for Microsoft Active Directory Software-defined perimeter: What it is and how it works BrandPost: How to Improve Security with a Zero Trust Approach Cisco expands its SD-WAN software for wider reach, better security BrandPost: Architecting the Zero Trust Enterprise: The Benefits of Adopting a Holistic Approach to Zero Trust BrandPost: Cloud Lateral Movement: Breaking in Through a Vulnerable Container VMware to pay $8M fine, settling charges it fudged the timing of backlogged orders BrandPost: How to Stop Ransomware Q-Scout aims for smartphone security without the intrusiveness One-third of enterprises don’t encrypt sensitive data in the cloud Nvidia Hopper GPU slays predecessor in ML benchmarks Hands-on cyberattacks jump 50%, CrowdStrike reports CNAPP buyers guide: Top tools compared U.S. government offensive cybersecurity actions tied to defensive demands AWS, Harvard collaborate to advance quantum networking New US CISO appointments, September 2022 CISA launches incident, ransomware reporting rulemaking RFI 8 notable open-source security initiatives of 2022 Pages