• Wed. May 13th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Information Security

  • Home
  • The present and future of Zero Trust segmentation at Gray Television

The present and future of Zero Trust segmentation at Gray Television

Gray Television has embarked on a transformative digital journey to modernize and secure its network infrastructure, and I’m excited to share our experiences and insights from this process. Our story…

Skyhigh Security announces new cloud-to-cloud integration with Trellix

Skyhigh Security today announced an integration between Skyhigh Secure Web Gateway (SWG) for Cloud and Trellix Intelligent Virtual Execution (IVX) Cloud to strengthen enterprises’ security posture. Through this cloud integration,…

Why CISOs Need Application Detection and Response

What most chief information security officers (CISOs) know about their organizations’ applications and application programming interfaces (APIs): Whether their teams are finding vulnerabilities Whether they’re fixing vulnerabilities That’s not nearly…

CyFlare CEO Explains Why Cyber Security Mesh Architecture is a Top Priority

MSSP Top 250 company CyFlare is taking a new approach to its cybersecurity — a framework called Cyber Security Mesh Architecture (CSMA) What is CSMA and why is it so…

Post-Compromise Security: What to do When the Hackers Get in

When a cybercriminal compromises your network they often do not strike immediately. There is a vast amount of activity undertaken by threat actors between initial compromise and impact. This presents…

What Degree Do You Need for a Career in Cyber Security?

By University of North Dakota/August 14, 2024 As we acknowledge the dynamic nature of the digital landscape, it’s crucial to recognize the demand for cyber security professionals, reflecting the evolving…