Micro-segmentation is the one word that strikes most security engineer’s minds when they talk about stopping attackers from moving laterally across networks. But why aren’t many people doing it? Because achieving micro-segmentation in hybrid data centers often proves ridiculously difficult.

Network-based micro-segmentation

In earlier years, organizations used to place all workloads and…

Endpoint threat landscape

Cybercriminals relentlessly target end-user devices such as desktops, laptops, and mobile devices or the Internet of Things (IoT) devices to gain an entry into the corporate network. In numerous ways, endpoints are compromised and often become hacker’s gateway into the corporate environment. It is an undeniable fact that end-user protection…

In 2009, a person from Miami hacked the payment card network from companies & stole tens of millions of credit card and debit card numbers from over 250 financial institutions.

Three healthcare payer organizations had been attacked in the United States in 2014 and 2015 & netted information on more…

Anandadip Mandal

Technology evangelist |Building next-generation cloud network security products

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store