arrow down
Arrow down
Arrow down
Arrow down

Posts tagged with: netops

Join This Technical Session: How to be Audit and CCRI Ready using a Network Digital Twin for Federal and Commercial Organizations

Are you ready to take your network security to the next level? Don't miss our upcoming session where our top engineers will dive into the transformative potential of Network Digital Twins for ensuring audit readiness and compliance for both federal and commercial organizations. In today's digital landscape, being prepared for audits and meeting Compliance, Certification, […]

Overcoming Network Migration Challenges with Forward Networks 

Network migration is a critical undertaking for any organization looking to optimize their network performance, adopt new technologies, or achieve cost savings. However, this process poses numerous challenges that can lead to disruptions and unwarranted risks if not properly managed.   One of the primary challenges of network migration is verifying that the network behaves and […]

How do you know a software rep is lying?

A customer posed this question to me recently; after pausing and smiling (a little too) broadly, he continued, “Their lips are moving.” I thought this would be funnier if it weren’t partly true. The software industry has over-promised and under-delivered for years, making technical executives rightfully skeptical when they hear a new promise. Unfortunately, it’s […]

What’s it Like to Work at a Great Place 

Forward Networks was just named a Great Place to Work in the Bay Area by Fortune. We’re excited to be on this list in an area known for setting the bar high when it comes to treating employees well. Perks are nice, but perks alone don’t get 100% of employees to say they work at […]

New Connectivity Insight for SecOps and NetOps

Last June, Forward Networks announced several enhancements to the platform designed to help SecOps teams prove compliance, automate CVE (common vulnerabilities and exposures) responses, and remediate threats quickly. Today, we’re happy to share that we’ve continued to build out our security use cases by adding new functionality to our security posture security matrix (previously known […]

Log4Shell – Do you know what you don’t know?

Is it just me or is the announcement of a significant CVE becoming a holiday tradition? Discovered on December 9, 2021 by Minecraft players, the Apache Log4Shell vulnerability is uniquely insidious because it infects servers which are traditionally well insulated from attacks, perceived as unreachable by intruders, and not at risk for CVEs. Log4Shell is an […]

How to Safely Integrate Networks During Mergers and Acquisitions

I recently published a piece in Dark Reading covering the network security challenges of M&A activity.  As we ease the restrictions put in place to combat COVID-19, we’re expecting to see business activity including M&A pick up speed, it’s important that the implications of integrating networks are fully understood to ensure that the expected business benefits […]

Hey buddy – wanna buy a zero trust?

In the past couple of weeks, I’ve had the opportunity to attend two technology events IN PERSON!!! Seeing people “mask-to-mask” has been fun and educational.    Forward Networks recently exhibited at Black Hat in Las Vegas and AFCEA TechNet Augusta. Obviously, security was the topic at Black Hat, but it was also top of mind for TechNet attendees, and attendees at both events stressed the need for better network behavioral insight. A common theme […]

You Can’t Secure What You Can’t See

Between us — there’s no such thing as zero trust — it’s a catchy term used to describe a very complicated approach to security. But just because marketing loves the term doesn’t mean we should ignore the concept. The idea of zero trust is the assumption that users should be granted the least access possible to […]

Verify and Validate Zero Trust Architecture

With the constant rise of modern cyber threats, many businesses are aiming for zero-trust infrastructure to keep themselves and their customers safe. But a zero-trust environment, where only authorized people can access information and resources, is often more difficult to implement than anticipated. If security teams and network engineers cannot visualize the network and its […]

Top cross