GUEST OPINION: Gigamon’s ANZ Manager, George Tsoukas has shared information on an often overlooked data security area. He explains that at its most basic, a network is a system comprises two or more computers sharing resources, data and communications, with the goal of accomplishing essential tasks more quickly and effectively.
GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: New technology always brings a host of worries about its negative potential, and 5G is no different. Although there are many legitimate 5G security concerns to address and discuss, it’s worth first clarifying the false claim that 5G causes health problems.
GUEST OPINION by George Tsoukas, ANZ Country Manager, Gigamon: The cloud is an extremely complex environment. To help ensure that organisations derive maximum advantage out of it, they need to be able to see exactly what’s happening at all times. They need cloud monitoring.
GUEST OPINION by Shehzad Merchant, Chief Technology Officer, Gigamon: Dealing with a security incident requires not just prompt notification of the incident but the ability to triage the cause of the incident.
COMPANY NEWS by Gigamon: Dealing with a security incident requires not just prompt notification of the incident but the ability to triage the cause of an incident, cautions Gigamon, leader in cloud visibility and analytics.
GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly in recent years. Historically, adversaries linked to state sponsors or similar activities would engage in data theft to further goals of industrial espionage or intellectual property theft.
GUEST OPINION by Joe Slowik, Gigamon: Network security operations generally and network security monitoring (NSM) evolve more specifically with technology like any other information technology (IT) field.
COMPANY NEWS by George Tsoukas, Gigamon: The internet is the most ambitious communication and data transference technology ever created. But with it advance come several challenges, and as we improve our ability to share large amounts of information between computers, servers and other digital devices, the risk of that data falling into unauthorised hands increases significantly.
GUEST OPINION by Joe Slowik, Gigamon: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly over the past few years.
Since grabbing headlines in early May, the high profile ransomware incident impacting the US oil pipeline system Colonial Pipeline has attracted significant attention from both media and information security spaces, given the event’s scope and impact.
GUEST OPINION by George Tsoukas, Gigamon ANZ: Today’s powerful digital applications often span multiple tiers running on multiple on-premises and cloud platforms. This can lead to a fragmented, inconsistent view of data in motion and visibility gaps and blind spots that make it hard to deliver a secure, optimal user experience.
Cloud visibility and analytics provider Gigamon has announced its latest Gigamon Hawk technical integration with the intelligence-led security company FireEye.
GUEST OPINION by George Tsoukas, Gigamon ANZ: While the financial services industry is no stranger to unexpected events and their repercussions, the current global upheaval is creating unprecedented uncertainty. Faced with this, how should financial services organisations respond?
IT complexity, which grew exponentially following the recent acceleration of digital transformation, has led to a foundational gap in visibility across the underlying hybrid infrastructure.
GUEST OPINION by George Tsoukas, Gigamon: For organisations that want to full benefit from their approach to the cloud, cloud-native computing may provide the answer. Unfortunately, although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing actually is.
GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: In a recent study, 60 percent of CIOs and IT executives surveyed said they expect a decline in their budgets as a result of the pandemic. Simultaneously many CIOs and IT managers are being told to find ways to accelerate digital transformation to provide an improved customer and user experience.
GUEST OPINION by Dave Arkley, CFO, Gigamon: While it’s always important to highlight value, in the current environment communicating a strong ROI message is more important than ever.
GUEST OPINION by George Tsoukas, ANZ Manager, Gigamon: The advent of 5G is one of the most hotly discussed topics in the tech world today, for good reason. The technology is expected to provide a $5 billion boost to Australia’s economy by 2030, according to Deloitte and Telstra, leading to the creation of countless new jobs and opportunities.
NetComm was given an early Mac by Apple in 1984. I set about developing a NetComm program for it, and[…]
A partial victory indeed. Meanwhile Julian Assange is still stuck in gaol while lawyers and activists feast on his discomfort.[…]
Yes indeed, unwelcome scam calls are on the rise!add trojan and phishing links in unsolicited SMS to that list :)Interesting,[…]
the G-sync compatible TV is great but I wanted to read more on the LG Rolling Bot to see if[…]
I purchased a NOVOO USB C Hub 8 in 1 USB-C Dock back in 2020 for my Dell XPS-15 when[…]