Pete Bartolik

Pete Bartolik has researched and written about technology and vertical market segments for many years and has worked on many market research, writing and social media projects. He was news editor of the IT management publication, Computerworld, and a reporter for a daily newspaper.

Financial Services Malware Just Won’t Die. What to Do About It.
BrandPost Akamai and Telstra

Financial Services Malware Just Won’t Die. What to Do About It.


Vigilance and Planning: Experts Share Their IT and Data Security Strategies

Vigilance and Planning: Experts Share Their IT and Data Security Strategies

IT and security leaderstake proactive approaches to secure and protect IT environments amid the evolving threat landscape.

5 Steps to Secure Your Hybrid Workers

5 Steps to Secure Your Hybrid Workers

Patchwork solutions aren’t the answer—it will take a new approach to address critical challenges in the new workplace.

Biometric Adoption is Driving a Passwordless Future

Biometric Adoption is Driving a Passwordless Future

Enterprises are taking steps to move away from passwords and adopt low-friction authentication methods. The payoff? Greater security.

Invest in Security Now for Tomorrow's Challenges

Invest in Security Now for Tomorrow's Challenges

Transitioning to simplified and scalable connectivity with SASE promises better protection for users and endpoints while optimizing performance

XDR Solutions Drive Faster Incident Response

XDR Solutions Drive Faster Incident Response

Extended detection and response (XDR) platform solutions aggregate threat intelligene, local security context, and protective capabilities from multiple security components.

Security and the Cloud Go Hand-in-Hand: Are You Prepared?

Security and the Cloud Go Hand-in-Hand: Are You Prepared?

These migrations create new issues for network admins and are inherently risky from a cyber perspective.

Choosing Cybersecurity Products

Choosing Cybersecurity Products

Using a network layer-based approach for comprehensive coverage.

Beyond the Firewall - Different Rules for East-West Traffic

Beyond the Firewall - Different Rules for East-West Traffic

Network firewalls were created to block unauthorized content and code from the network while ensuring the unimpeded flow of data packets vital to the operations of the enterprise. But they were designed to intercept external...

The Growing Role of Network Teams in Security

The Growing Role of Network Teams in Security

It's time to break down the wall between network and security teams.

Load More