Artificial Intelligence (AI) is rapidly advancing and changing how we live, learn, and work. Since I work in cybersecurity, I did some deep dives to formulate my opinion on the topic. In this article, I will explore many ways AI can impact cybersecurity from both the attacker and defender sides. Earlier, I knew we were […]
You are browsing archives for
Author: admin
Review of “Stolen Focus: Why You Can’t P
As a senior technology professional who lived through the earlier half of his life without the internet, I found Johann Hari’s book, “Stolen Focus: Why You Can’t Pay Attention,” to be a real eye-opener. With all the distractions of modern life, it’s no wonder we struggle to focus on anything for more than a few […]
AIBridge Machine Learning Bootcamp for A...
As a technology professional, I’m always on the lookout for ways to improve my skills and stay up-to-date with the latest trends in the industry. So, when I heard about the AIBridge Machine Learning Bootcamp, I jumped at the chance to enroll. I always wanted to learn AI/ML and since this was a free 4-day […]
What did you do differently as a leader ...
The COVID-19 pandemic started approximately a year ago, and shelter in place (also called lockdown in some geographies) began about nine months ago. When it started, I thought it would last a few weeks or at the max month or two. That was an error in my judgment. Soon it dawned upon me that it […]
Cybersecurity Alphabet Soup: SDP, ZTNA, ...
The technology industry is a breeding ground for creating TLAs (Three Letter Acronyms) and FLAs (Four Letter Acronyms). So, having a few more TLAs and FLAs to the party is just normal business. In recent years, SDP and ZTNA have caught up, and in the year 2020 a new term SASE has picked up the […]
The Art & Science of Product Messaging
In one of my earlier posts, specifically “My first 100 days as a Product Marketer!” I had said I would be back when I have something to say on product marketing. So, I am back after a long hiatus to share my two cents on messaging, and it’s correlation to the “information sharing” between a […]
5 Takeaways from the Peerlyst SF Bay Are...
Last week, I organized Peerlyst SF Bay Area Cybersecurity Meetup. It was an interesting event for many reasons. Here are my top 5 takeaways from the event. 1. Good guys are really passionate about fighting the bad guys. Good and bad has probably been part of life from the beginning of time. We have all heard stories […]
My first 100 days as a Product Marketer!
Recently, I moved from a Product Management to a Product Marketing role. This post is an attempt to explore my early impressions about product marketing and what I learned during my first 100 days as a Product Marketer. BTW, I am not trying to explain what Product Marketing is, if you want details on that […]
Firewall management needs of a Distribut...
By Distributed Branches, I mean deployment scenarios where you see firewalls deployed in hundreds to thousands of branches. Examples of this deployment scenario are Retails and International Chains, which have stores or branches all over the globe. Retail/Department Stores Pharmaceutical Chains Financial Institutions I will bring out specific examples with the number of firewalls they deploy […]
Firewall management needs of a Large Ent...
Any organization above $1 billion in revenues and more than 5000 employees can be considered as a large enterprise. Most Large Enterprises have different type of firewall deployment needs such as Internet-Edge Firewalls Data Center Firewalls Branch Office Firewalls This segment also becomes more interesting because they generally have both Network & Security Operations teams, which access those firewalls. Users […]