What Are You Doing to Inspect Encrypted Traffic? [Video]

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often... Read more »

Security for Intent-Based Networking

Networks have become more massive and complex than ever before. This year at Cisco Live US, people were talking about managing and defending networks at scale. Chuck Robbins, CEO of Cisco, said... Read more »

What, Me Worry? Lackadaisical Employee Attitudes Resulting in Cybersecurity Calamities and Lurking Attacks

The role of IT in defending against cyberattacks is more difficult than ever. It becomes even more challenging when IT departments are forced to tackle the lack of willingness by employees to... Read more »

A10 CEO Lee Chen on CNBC: The Cybersecurity Cat and Mouse Game

The frequency, size and volume of cyberattacks will increase in 2018, said A10 Networks CEO Lee Chen during an appearance this week on CNBC. Expect more and larger hacking cases next year... Read more »