Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security //


12:00 PM
Dan Reis
Dan Reis

Podcast: Digital Transformation, SD-WAN & Optimal Security

Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.

Welcome to another SecurityNow Podcast.

Recently I had the opportunity to discuss digital transformation with Josh Flynn from Cybera. This is a complex, multi-faced issue that presents organizations with a number of challenges. The rapid adoption of new digital services and applications can stress the ability of existing network infrastructure to deliver performance and maintain security without having to add a lot of expensive equipment. Because the network is an enterprise frontline to the world, ensuring that it can support new services quickly without sacrificing security or performance is crucial. We will be delving into this subject with Flynn, finding out how organizations can support a digital transformation within existing budgets while maintaining security and performance.

Stay up to date on NEW SecurityNow content, such as news, podcast interviews from the frontline, instructive webinars and in-depth, topical eBooks by registering here for our weekly SecurityNow Debrief

This podcast is sponsored by Cybera. Cybera technology is customer-proven with more than 90,000 install locations worldwide supporting point of sale, loyalty, mobile payment, tank monitoring and digital signage applications. If you want to learn more about Cybera and how it redefines secure SD-WAN for remote sites, visit www.cybera.com

Related posts:

Dan Reis, Expert Analyst, SecurityNow

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-24
Unisys OS 2200 Messaging Integration Services (NTSI) 7R3B IC3 and IC4, 7R3C, and 7R3D has an Incorrect Implementation of an Authentication Algorithm. An LDAP password is not properly validated.
PUBLISHED: 2022-01-24
Cross-site Scripting (XSS) - DOM in GitHub repository mrdoob/three.js prior to 0.137.0.
PUBLISHED: 2022-01-24
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
PUBLISHED: 2022-01-24
Dell EMC Data Protection Central versions 19.5 and prior contain a Server Side Request Forgery vulnerability in the DPC DNS client processing. A remote malicious user could potentially exploit this vulnerability, allowing port scanning of external hosts.
PUBLISHED: 2022-01-24
Dell EMC Data Protection Central version 19.5 contains an Improper Input Validation Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to denial of service.