Home » Enterprise Security » Machine Learning Stops Web Application Threats while Reducing False Positives
Why Legacy Security Architectures are Inadequate in a Multi-Cloud World
Read the eBook learn more about the security gaps, compliance, and administration issues due to cloud. Plus...
Other content in this Stream
Case Study: Multi-Layered Security Solution Protects Students on Their Educational Journey
Delsea Regional School District is a public school system located in Gloucester County, New Jersey. Serving the seventh through twelfth-grade populations of Franklin and Elk Townships, the district...
Fortinet and IBM Sign Cyber Threat Information Sharing Agreement
Fortinet and IBM Security have now announced that they will actively share cyber threat information.
CenturyLink's Anil Simlot on automation, SDN and NFV
CenturyLink's Anil Simlot has a lot on his plate now that he's the new leader of the telco's virtualization organization. Simlot, vice president of virtual services development and support, is now...
AI and 5G go hand-in-hand for network operations
As network attacks get more sophisticated, AI can help with threat detection As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable...
AT&T's Mazin Gilbert discusses game plan for next-generation networks
For Mazin Gilbert, vice president of advanced technology and systems at AT&T Labs, edge networking is just a piece of the larger networking puzzle that involves mobile applications, autonomous...
Fortinet Announces Enhancements to Our Security Services Portfolio
Fortinet's threat intelligence security subscriptions ensure that your Fortinet security solutions are tuned continuously with up-to-the-minute insight into threats occurring anywhere in the world...
Join Fortinet at Black Hat USA 2018 in Las Vegas
Join us in Las Vegas
Service Provider Security in an Era of Software Defined Anything
Change is a constant in the worlds of service providers. But it gets more interesting when we look at what’s changing, why, and what it means to service provider operations and their customers.
'Identity Has Become the Perimeter': Oracle Security SVP
Eric Olden, Oracle's new leader in security and identity, shares how the enterprise tech giant plans to operate in a cloud-first world.
Orange Business Services' John Isch: Think of security first when planning for SD-WAN services
With Orange Business Services' presence in 220 countries and territories, John Isch, director of network and voice practice in North America, has seen the gamut of issues when it comes to...
Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD
As consumer Internet of Things (IoT) devices inevitably find their way into the workplace, IT pros need to isolate them from the rest of the enterprise network, perhaps on a network of their own,...
Hughes Introduces Secure SD-WAN Platform
New solution for distributed enterprises combines firewall security and SD-WAN functionality in one easy-to-deploy platform.
Securing Our Interconnected Infrastructure
A little over a year ago, the world witnessed NotPetya, the most destructive cyberattack to date. What have we learned?
CenturyLink connects with Oracle Cloud to serve enterprise customers
Oracle customers can now access their data and business applications across North America and Europe thanks to a new deal with CenturyLink.
Fortinet Expands Security Fabric Offerings on Google Cloud Platform
Fortinet announced at Google NEXT the availability of a series of Fortinet Security Fabric solutions that will help organizations securely accelerate their migration and development of...
Security Vendor Fortinet Sells SD-WAN Directly to Customers
The security vendor Fortinet is offering software-defined wide area networking (SD-WAN) technology directly to end customers.
Amazon Web Services in test phase with white box switches: report
Amazon Web Services may throw its considerable weight into the white box ring, which could have large implications for Cisco and other vendors. Amazon is currently testing white box switches that...
What Cloud Natives Can Teach the Rest of Us
Cloud natives differ from traditional companies in more ways than just their lack of legacy infrastructure: They think and operate differently.
Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and...
Locking It Down: Securing Multicloud IT Across Industries | Light Reading