Archived Events
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network ...
One of the challenges facing public sector organizations, such as U.S. and international government agencies, is the inability to carry IT gear from one place to another to ensure security and compliance. Many of these organizations have ...
The Zero Trust journey needs to start with a sound strategy. Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and ...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl ...
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have ...
Armis, Gigamon and ̽»¨ÊÓÆµ completed a hands-on experience in the Armis platform, which will help you understand the ease of use, simplicity, and business value for your organization when responding to critical cyber incidents.
The session dove into the intersection of Operational Technology (OT), ...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational ...
̽»¨ÊÓÆµ invited LiveAction CTO and Founder John Smith, and Gigamon Senior Sales Engineer Matt Hollingsworth, for a joint webinar on March 21st at 2pm EST where attendees learned:
White House Executive Order and Memorandums on Zero Trust and OMB M-21-31
Definition of Zero Trust and its ...
Cloud service providers adhere to a shared security responsibility model. This means that customer security teams maintain some responsibilities for security as they move applications, data, containers, and workloads to the cloud, while the provider takes some responsibility, but not all.
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a ...