Spotlight on Key Trends and Insights from ONUG Spring 2023

The recently concluded ONUG Spring 2023 in Dallas was a resounding success, marked by insightful discussions, vibrant networking, and a deep dive into emerging trends and practices. The keynotes by Merck and Cigna were standout moments of the conference. Merck’s talk provided unique insights into leveraging technology to optimize operations within the pharmaceutical sector, while Cigna gave a compelling presentation on the power of data analytics and personalized customer experiences in the health services industry. Nick Lippis and Dr. Alex Shulman kicked off the conference…

The Great Debate: Is Everyone Doing Cybersecurity Wrong?

Organizations have cybersecurity as a top-of-mind priority – but are they spending their limited time and resources on the right areas? Or are many companies’ approaches to cybersecurity often misguided and ineffective? And if they are, what can companies do to protect themselves properly and proactively? Cybersecurity experts Greg Ferro of Packet Pushers and Johna Till Johnson of Nemertes recently had an entertaining – and direct – debate on the right approach to enabling cybersecurity. They covered everything from how the wrong mindset leaves companies…

How to Protect Your Data from Ransomware and Double-Extortion

Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a ransom for decryption has proven to be an effective tactic for cybercriminals, with a steady stream of recent attacks serving as a constant reminder. However, these attackers are continually refining their tactics and have recently turned to double-extortion, whereby they threaten to leak victims’ sensitive files in order to increase the odds of ransoms being paid. Kaseya-style…

The Six Business Benefits of Zero Trust Segmentation

At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another. Adopting a zero trust— “Never trust, always verify” —strategy can help you tamp down on application- and services-related vulnerabilities, thereby reducing friction for the rest of the organization. But despite its widespread use in cybersecurity circles, the term “zero trust” is not well understood—especially when it is applied to segmentation or microsegmentation—and it’s up to security teams to explain why…

Realize the Promise of a Virtualized Multi-Service Ecosystem

Comcast Business ActiveCore℠ SDN platform provides a multi-service ecosystem that is truly changing network management. Jody Hagemann of Comcast led a panel discussion at last year’s ONUG conference that explained how ActiveCore is providing users with the flexibility and customization they need to develop technology solutions to meet mission-critical business needs. Joining her were ActiveCore partners Jonathan Nguyen-Duy of Fortinet, Kelly Ahuja of Versa Networks and Conrad Menezes of HP: Aruba. This informative keynote focused on how ActiveCore orchestrates best-in-class network functions from various technology…