Blog

Blog Posts by Category

Digital Twins As industries around the world continue to integrate advanced technologies, the convergence of Operational Technology (OT) with Information Technology (IT)...

Strengthening OT Security with IEC 62443 Compliance Industrial environments face evolving cybersecurity threats, especially with the growing convergence of IT and OT...

The major industrial solution and equipment providers, also known as the “big industrials,” including Siemens AG, General Electric (GE), Schneider Electric, Honeywell,...

Securing OT Environments As organizations increasingly adopt digitization and automation, ensuring robust security for OT (Operational Technology) networks becomes a top priority....

The Role of Overlay Networks in Modern IT Infrastructure “Traditional networking is crumbling under the weight of today’s hyperconnected world, failing to...

You may have noticed that here at NetFoundry, we talk a lot about AppNets(TM). Thanks to the miracle of overlay networking, just...

Magic and Pasta (Zero Trust Networking) I had always had trouble explaining to my eldest daughter what I did for my job...

In today’s hyper-connected digital world, where cyber threats are becoming more sophisticated and pervasive, Identity forms a crucial pillar of Zero Trust...

The Cybersecurity Landscape is Undergoing a Seismic Shift Traditional perimeter-based security models, once considered infallible, are now riddled with vulnerabilities, exposed by...

In today’s interconnected world, API Gateway Security fuels the lifeblood of business interactions. Yet while fostering connectivity, APIs’ inherent openness creates a...

Multi-Cloud Security: The Rise of the Supercloud In December 2021 Dave Vellante wrote in siliconANGLE about “The Rise of the Supercloud”. Supercloud...

Zero Trust Solutions and Vendors “Zero trust” is often a long, tough journey.  But it doesn’t need to be.  And the answer...

Authentication in IoT (Internet of Things) is hard. Authenticating devices and users face challenges like scalability, resource constraints, device heterogeneity, interoperability issues,...

Securing LLM environments is hard. It involves challenges such as protecting data privacy and confidentiality, implementing robust access control and authentication, ensuring...

In today’s digital landscape, where cybersecurity threats are ever-evolving and becoming more sophisticated, organizations face significant challenges in protecting their sensitive data...

Welcome to Part 2 of our Zero Trust Journey! This article focuses on applying the principle of zero trust to our existing...