Continuous Penetration Testing for a Secure SASE Environment: How Autonomous Pen Testing Enhances Your Security Posture

Introduction: The SASE Advantage — and the Hidden Risks Today’s businesses depend on fast, secure access to cloud apps, data, and systems from anywhere. That’s why many are turning to Secure Access Service Edge (SASE) solutions, which combine networking and security into one cloud-delivered architecture. SASE brings together tools like SD-WAN, Zero Trust Network Access […]

Autonomous Pen Testing: The Future of Continuous Security Validation

In today’s constantly evolving threat landscape, it’s foolish to think that traditional point-in-time testing is enough. Cyber threats are dynamic, fast-moving, and automated — yet many security programs still rely on manual penetration tests done once or twice a year. Enter Autonomous Penetration Testing — an emerging technology that’s reshaping how security leaders validate risk. […]

Why is a Single-Vendor SASE important?

Why a Single-Vendor SASE Strategy Matters More Than Ever As the modern enterprise shifts toward cloud-native, hybrid work, and edge-first architectures, the pressure on IT and security teams to deliver secure, reliable connectivity has never been higher. SASE (Secure Access Service Edge) has emerged as the go-to architecture to meet these demands, converging network and […]

SASE vs. SSE: Two Roads to Secure Your Network—Which One Leads to the Future?

In today’s fast-evolving cybersecurity landscape, two acronyms have become front and center in boardrooms and IT discussions since 2020: SASE and SSE.  Their development has accelerated ever since in leaps and bounds – now, both play a critical role in cloud-delivered network security, but they are different. Understanding their differences and how they complement each […]

Why Security Appliances Are Not Enough for Enterprises: Insights from CVE-2024-3400

In the wake of the discovery of a critical CVE (Common Vulnerabilities and Exposures), CVE-2024-3400, within Palo Alto Networks’ GlobalProtect feature of PAN-OS software, it’s become increasingly evident that enterprises must approach their infrastructure security with a cautious perspective. While appliances designed to safeguard organizations can inadvertently serve as entry points for threat actors, employing […]

Cisco SASE and Cisco SD-WAN

This blog is shared courtesy of an article I wrote for Techtarget.com Cisco is, arguably, the most familiar name in networking. As a result, most enterprises likely have Cisco Secure Access Service Edge on their shortlist of SASE options. While Cisco’s SASE looks great in a presentation, network teams need to dig deeper to see […]

From SD-WAN to ZTNA to SASE: Don’t Lose Sight of What Matters

ZTNA and SASE

It wasn’t that long ago that SD-WAN was the next great frontier. It was the technology to displace MPLS and to give enterprise networking teams what they wanted for years – freedom from the tyranny of carriers with their overpriced capacity, long deployment times, and dysfunctional support.  In short, it seemed like SD-WAN was the […]

SASE and Last Mile Redundancy: Is 5G the Answer?

5G SASE Resilience

Increasingly, I’m being asked about 5G and SASE. How are the two related? Which SASE vendors support 5G?  So let’s address it here.  Last Mile: Where the Action Isn’t  The last-mile has always been the Achilles heel of enterprise networking. In the core, we’ve had an abundance of bandwidth. The many paths comprising the core […]

Alternative Private Backbones for SASE and SD-WAN

private backbones for SD-WAN

Part of the premise behind secure access service edge (SASE) and global SD-WAN services is to replace the MPLS services that long anchored enterprise networks. But to do that, they first need ways to overcome the unpredictable and high latencies of the global Internet. Enter global private backbones. Whether they’re independent backbones, like Azure Virtual […]

Zero Trust: What To Consider When Evaluating SASE Solutions

ZTNA and SASE

One of the big changes in the network selection processes that I’ve been running of late has been the interest in remote access and in particular Zero Trust Network Access (ZTNA). Once a poor step-child to the WAN, remote access has, of course, become the de facto approach for how many of us work every […]