George Tsoukas stories
What CISOs think about cyber security, visibility and cloud
Cloud adoption is growing rapidly in Asia Pacific, but security concerns remain as 72% of adopters do not have all workloads secured.
Let’s clear the cloud visibility haze with app awareness
Organizations embracing cloud computing face challenges with identifying applications and filtering traffic. A cloud suite can provide a solution.
Why it's essential to focus on security fundamentals
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.
How to prevent ransomware devastation
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Why network visibility must be the foundation of Zero Trust architecture
US Presidential Executive Order 14028 directs federal agencies to transition to a Zero Trust Architecture for cybersecurity.
Dark clouds on the horizon: How to close the gaps in cloud security
Cloud security is more trusted than ever, but there are still gaps that need to be addressed. Find out what they are in this article.
What is OT security and how does it differ from IT security?
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
What exactly is 5G security, and why is it essential?
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
How cloud monitoring delivers both challenges and benefits
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms.
Three ways Shark Week mirrors cybersecurity marketing
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
What Is TLS 1.2 — and why should we still care?
TLS 1.2, the improved version of the Transport Layer Security protocol, is crucial for data security as TLS 1.0 and 1.1 become unsupported.
How multi-cloud visibility ensures business continuity
New technology solves the visibility gap in hybrid clouds, providing a single view of data in motion and optimising user experience.
Three security essentials for financial services
Financial services must adapt to the current global upheaval by prioritizing customer experience and security, while optimizing costs.
What cloud-native actually means
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.
The ins and outs of cloud-native computing
Cloud-native computing is a way of thinking, as well as a computing architecture. But what are the benefits? #cloudcomputing #cloudnative.
Why network monitoring and visibility are key to 5G success
Service providers must be prepared to offer unparalleled 5G experiences without compromising on speed, performance or security - all without breaking the bank.
Why IT and HR must work together to help businesses weather the storm
Remote work is the new norm in Australia, but IT and HR teams must partner to ensure cybersecurity and employee well-being.
Network visibility is the crux of security in 2020
Pandemic remote working surge in Asia Pacific ups cyber risks; firms eye robust security strategies.
How businesses can lift protection against mobile threats
Rise in personal phone use for work and mobile malware pose increasing risks to organizations, warns report. #cybersecurity.
Video: 10 Minute IT Jams – Who is Gigamon?
Gigamon is a network visibility and analytics company headquartered in California with offices all over the world.
Gigamon names ANZ country manager
With over 20 years of regional field and leadership experience, Tsoukas joins Gigamon to oversee growth in the region.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.