Network security automation uses machines to programmatically execute security tasks. Typically, network security automation is used to manage the low-complexity, high-volume aspects of detection, investigation, and mitigation. For instance, automation can be used to separate...
Network security professionals are unsung heroes. Everyday news app visitors won’t read about all the wonderful work you’re doing. On occasion, they’ll only see and read about fellow professionals having the worst days of their...
In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the...
Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could...
In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the...
This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security...
In this series, FireMon looks at the five most important capabilities a network operator must build into their management practices in order to keep their environments secure, compliant, and ready to grow. Here is the...
We’re in the middle of a business model revolution. Transformation, automation, and globalization are enabled by emerging technologies like artificial intelligence, IoT, mobile, and cloud-native apps. As a result, the typical enterprise network is a...
This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here. Many organizations have adopted a...
Before working for FireMon, I was a cybersecurity professional at a Fortune 500 where I inherited a lot of firewalls with a lot of rules. Complexity was king, and chaos reigned, but implementing FireMon made...