SASE | News, how-tos, features, reviews, and videos

cloud security
3 security vendors


Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution

Cybersecurity vendor updates Prisma solution to help customers address increasing SaaS security challenges, along with detecting and preventing phishing, ransomware, and C2 attacks.

virtual network security picture id1208405529

Cato Networks launches SSE system with customizable DLP capabilities

Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

Access control setting on a virtual display [authentication/privileges]

Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks

A risk-based approach restricts access to specific resources and capabilities within applications.

An IT technician works on laptop in data center, with other IT staff in the background.

Windstream Enterprise launches managed SASE with Cato Networks

The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Forcepoint One combines zero trust and SASE under a single umbrella

Forcepoint introduces a single security platform as an alternative to a best-of-breed approach.

staffing the hybrid cloud public private cloud clouds

The 3 biggest challenges of SASE in hybrid cloud environments

Tool sprawl, inadequate cooperation between network and security teams, or lack of trust can derail SASE adoption in hybrid cloud environments.

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

tc constantin

Get up to speed on SASE: What's driving demand and how providers' capabilities differ

As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and...

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

basics / building a foundation / how-to / process / steps / stacking blocks

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

vcmar sase

WAN evolution: From SD-WAN to Secure Access Service Edge (SASE)

Join IDC analysts Brandon Butler and Christopher Rodriguez as they talk with Network World’s Ann Bednarz about the SASE model for streamlining network access and improving security. Deployed as a cloud service, it blends SD-WAN’s...

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

You Might Also Like