You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 30 Next »

Vidder Product Videos on SDP

Cryptozone, "The Software Defined Perimeter: Creating an Invisible Infrastructure." (Webinar)

Cryptozone, "The Software Defined Perimeter: Creating an Invisible Infrastructure." (PowerPoint presentation)

Google Security Blog, "Growing Eddystone with Ephemeral Identifiers: A Privacy Aware & Secure Open Beacon Format." 14 April 2016.

SmartCities Council, "How Can You Have Privacy When Devices Are Always On & Listening?" 14 April 2016.

Cryptozone, "Dramatically Improve Network Security Using SDP." (Webinar) 13 April 2016.

Gartner, "Existing Security Best-Practice Can Handle IoT Exposure?? Not Really." 8 April 2016.

The Chronicle of Higher Education, "Faculty Unions in Minnesota Say New Cellphone Rule Violates Privacy." 31 March 2016.

Computing Now, "How Open, Hardware-Based IoT Security Can Be a Win-Win for Innovation & Regulation." 25 February 2016.

Gartner, "How Do You Secure Enterprise Application Access to Enable Business Agility?" 17 February 2016.

iapp, "Visceral Data: After Heartbreak, IoT Devices Give Us 'Something to Show'." 12 February 2016.

National Science Foundation, "A Partnership to Secure and Protect the Emerging Internet of Things." 28 August 2015.

Network World, "Attention Whitehats, the FTC Wants You to Lead New Privacy, Security Push." 28 August 2015.

What It All Boils Down To, "The Distance Between Hype and Adoption, 2015 Edition." 21 August 2015.

Gartner, "Gartner's 2015 Hype Cycle for Emerging Technologies Identified the Computing Innovations that Organizations Should Monitor." 18 August 2015.

Govtech.com, "Cybersecurity: Fix It of Die?" 14 August 2015.

New York Times, "Why 'Smart' Objects May Be a Dumb Idea." 10 August 2015.

Forbes, "The Internet of Things is About the Data, Not Things." 30 July 2015.

HP, "HP Study Reveals 70% of Internet of Things Devices Vulnerable to Attack." 29 July 2015.

Tom's IT Pro, "Google Adopts Zero Trust Network Model for Its Own Cloud." 13 May 2015.

The Wall Street Journal Blog, "Google Moves Its Corporate Applications to the Internet." 11 May 2015.

Security Intelligence, "How Software Defined Perimeter Can Help Secure the Clinical Environment." 2 April 2015.

Gartner, "Gartner's Top 10 Strategic Technology Trends for 2015." 18 February 2015.

Gartner, "Gartner: Top 10 Technology Trends 2015." 4 February 2015.

The Security Ledger, "Why Network Segmentation is Imperative on the Internet of Things." 27 January 2015.

Digitalist Magazine, "Gartner's Top 10 Strategic Technology Trends for 2015 Webinar Recap." 26 January 2015.

EDUCAUSE, "Top 10 IT Issues, 2015: Inflection Point." 12 January 2015.

Technossus, "The Top 20 Enterprise Technology Prediction Roundups for 2015." 9 January 2015.

UseNix.org, "BeyondCore: A New Approach to Enterprise Security." December 2014.

Business Insider, "Billions of Dollars Are Set to Flow into These 7 Areas of Tech in 2015." 18 December 2014.

Microsoft, “Microsoft Business Predictions for 2015: IOT Matures, Cybersecurity Bulks Up, and Machine Learning Gives Business a Big Advantage,” 17 December 2014.

Forbes, "IDC: Top 10 Technology Predictions for 2015." 2 December 2014.

Software Strategies Blog, “Gartner’s Top 10 Strategic Technology Trends for 2015.” 22 October 2014.

Forbes, "Gartner's Top 10 Strategic Technology Trends for 2015." 21 October 2014.

Gartner, "Gartner Identifies the Top 10 Strategic Technology Trends for 2015." 8 October 2014.

ARS Technica, "Crypto Weakness in Smart LED Lightbulbs Exposes Wi-Fi Passwords." 7 July 2014.

RSA Conference, "Software Defined Perimeter: Securing the Cloud to the Internet of Things." 26 June 2014.

Jericho, "Position Paper: Trust and Co-operation." December 2006.

Jericho, "Position Paper: Architecture for De-perimeterisation." April 2006.

Markets and Markets, “Cyber Security Market Worth $170.21 Billion by 2020.” 

 

  • No labels