Blog
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
Zero Trust Networking
Zero Trust Networking In today’s increasingly digital world, where cyber threats are becoming more sophisticated, traditional security measures are no longer enough to protect sensitive data and networks. This has led to the rise of a revolutionary approach known as zero trust networking. In this blog post, we will explore …
Zero Trust Network ZTN
Zero Trust Network ZTN In today’s rapidly evolving digital landscape, ensuring the security and integrity of sensitive data has become more crucial than ever. Traditional security approaches are no longer sufficient to protect against sophisticated cyber threats. This is where the concept of Zero Trust Network (ZTN) comes into play. …
Cloud Native Meaning
Cloud-native meaning In today’s technology-driven world, the term “cloud native” has gained significant attention. It is often used in discussions surrounding modern software development, deployment, and scalability. But what exactly does it mean to be cloud native? In this blog post, we will unravel the true meaning behind this concept …
Matt Conran | Network World
Hello, I have created a Network World column and will be releasing a few blogs per month. Kindly visit the following link to view my full profile and recent blogs – Matt Conran Network World. The list of individual blogs can be found here: Data Center – > SDN and agility …
Tech Brief Video Series – Enterprise Networking
Hello, I have created an “Enterprise Networking Tech Brief” Series. Kindly click on the link to view the video. I’m trying out a few videos styles. Enterprise Networking A – LISP Components & DEMO – > https://youtu.be/PBYvIhxwrSc Enterprise Networking B – SD-Access & Intent-based networking – > https://youtu.be/WKoGSBw5_tc ” In campus networking, there are a …
Tech Brief Video Series – Cloud Computing
Hello, I have created a “Cloud Computing Tech Brief” Series. Below, we have videos that can assist you in the learning process of cloud computing. Kindly click on the link to view the video. I’m trying out a few video styles. Cloud Computing A – Cloud – Introducing Immutable Server …
UNIKEN – Connecting Safe
Hello, I recently completed a 3 part package for Uniken. Part 1 can be found here – Matt Conran & Uniken. Stayed tuned for Part 2 and Part 3!
Correlate Disparate Data Points
Correlate Disparate Data Points In today’s data-driven world, the ability to extract meaningful insights from diverse data sets is crucial. Correlating disparate data points allows us to uncover hidden connections and gain a deeper understanding of complex phenomena. In this blog post, we will explore effective strategies and techniques to …
Paessler – NetFlow for Cybersecurity
Paessler purchased a three package article on NetFlow for Cybersecurity. Generally, the three posts relate to how NetFlow can be used to battle the ongoing threats of cybercriminals. Kindly, click the links. Part 1 – Matt Conran Paessler, Part 2 – Matt Conran Outbound DDoS, Part 3 – Matt Conran …
Internet of Things Access Technologies
Internet of Things Access Technologies In today’s interconnected world, the Internet of Things (IoT) has become a significant part of our lives. From smart homes to industrial automation, IoT devices rely on access technologies to establish connectivity. This blog post aims to delve into the world of IoT access technologies, …
ACUNETIX – Web Application Security
Web Application Security Hello, I did a tailored package for ACUNETIX. We split a number of standard blogs into smaller ones for SEO. There are lots of ways to improve web application security so we covered quite a lot of bases in the package. Multi-cloud design Part 2 “So why …
NetBrain Automate Security
NetBrain enables administrators to map any size network in seconds and incorporates 3rd Party systems into one single pane of glass. The adaptive security model provides the missing piece of the DDoS puzzle. Kindly review the following blog series – Part 1 – Matt Conran NetBrain, Part 2 – Matt …