top of page

Search results

626 results found with an empty search

  • AlgoSec | Errare humanum est

    Nick Ellsmore is an Australian cybersecurity professional whose thoughts on the future of cybersecurity are always insightful. Having a... Cloud Security Errare humanum est Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 11/25/21 Published Nick Ellsmore is an Australian cybersecurity professional whose thoughts on the future of cybersecurity are always insightful. Having a deep respect for Nick, I really enjoyed listening to his latest podcast “Episode 79 Making the cyber sector redundant with Nick Ellsmore” . As Nick opened the door to debate on “all the mildly controversial views” he has put forward in the podcast, I decided to take a stab at a couple of points made by Nick. For some mysterious reason, these points have touched my nerve. So, here we go. Nick: The cybersecurity industry, we spent so long trying to get people to listen to us and take the issue seriously, you know, we’re now getting that, you know. Are the businesses really responding because we were trying to get people to listen to us? Let me rephrase this question. Are the businesses really spending more on cybersecurity because we were trying to get people to listen to us? The “cynical me” tells me No. Businesses are spending more on cybersecurity because they are losing more due to cyber incidents. It’s not the number of incidents; it’s their impact that is increasingly becoming devastating. Over the last ten years, there were plenty of front-page headliners that shattered even seemingly unshakable businesses and government bodies. Think of Target attack in 2013, the Bank of Bangladesh heist in 2016, Equifax breach in 2017, SolarWinds hack in 2020 .. the list goes on. We all know how Uber tried to bribe attackers to sweep the stolen customer data under the rug. But how many companies have succeeded in doing so without being caught? How many cyber incidents have never been disclosed? These headliners don’t stop. Each of them is another reputational blow, impacted stock options, rolled heads, stressed-out PR teams trying to play down the issue, knee-jerk reaction to acquire snake-oil-selling startups, etc. We’re not even talking about skewed election results (a topic for another discussion). Each one of them comes at a considerable cost. So no wonder many geniuses now realise that spending on cybersecurity can actually mitigate those risks. It’s not our perseverance that finally started paying off. It’s their pockets that started hurting. Nick: I think it’s important that we don’t lose sight of the fact that this is actually a bad thing to have to spend money on. Like, the reason that we’re doing this is not healthy. .. no one gets up in the morning and says, wow, I can’t wait to, you know, put better locks on my doors. It’s not the locks we sell. We sell gym membership. We want people to do something now to stop bad things from happening in the future. It’s a concept of hygiene, insurance, prevention, health checks. People are free not to pursue these steps, and run their business the way they used to .. until they get hacked, get into the front page, wondering first “Why me?” and then appointing a scapegoat. Nick: And so I think we need to remember that, in a sense, our job is to create the entire redundancy of this sector. Like, if we actually do our job, well, then we all have to go and do something else, because security is no longer an issue. It won’t happen due to 2 main reasons. Émile Durkheim believed in a “society of saints”. Unfortunately, it is a utopia. Greed, hunger, jealousy, poverty are the never-ending satellites of the human race that will constantly fuel crime. Some of them are induced by wars, some — by corrupt regimes, some — by sanctions, some — by imperfect laws. But in the end — there will always be Haves and Have Nots, and therefore, fundamental inequality. And that will feed crime. “Errare humanum est” , Seneca. To err is human. Because of human errors, there will always be vulnerabilities in code. Because of human nature (and as its derivative, geopolitical or religious tension, domination, competition, nationalism, fight for resources), there will always be people willing to and capable of exploiting those vulnerabilities. Mix those two ingredients — and you get a perfect recipe for cybercrime. Multiply that with never-ending computerisation, automation, digital transformation, and you get a constantly growing attack surface. No matter how well we do our job, we can only control cybercrime and keep the lid on it, but we can’t eradicate it. Thinking we could would be utopic. Another important consideration here is budget constraints. Building proper security is never fun — it’s a tedious process that burns cash but produces no tangible outcome. Imagine a project with an allocated budget B to build a product P with a feature set F, in a timeframe T. Quite often, such a project will be underfinanced, potentially leading to a poor choice of coders, overcommitted promises, unrealistic expectations. Eventually leading to this (oldie, but goldie): Add cybersecurity to this picture, and you’ll get an extra step that seemingly complicates everything even further: The project investors will undoubtedly question why that extra step was needed. Is there a new feature that no one else has? Is there a unique solution to an old problem? None of that? Then what’s the justification for such over-complication? Planning for proper cybersecurity built-in is often perceived as FUD. If it’s not tangible, why do we need it? Customers won’t see it. No one will see it. Scary stories in the press? Nah, that’ll never happen to us. In some way, extra budgeting for cybersecurity is anti-capitalistic in nature. It increases the product cost and, therefore, its price, making it less competitive. It defeats the purpose of outsourcing product development, often making outsourcing impossible. From the business point of view, putting “Sec” into “DevOps” does not make sense. That’s Ok. No need. .. until it all gloriously hits the fan, and then we go back to STEP 1. Then, maybe, just maybe, the customer will say, “If we have budgeted for that extra step, then maybe we would have been better off”. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Network security management: Components & features

    Network security management is crucial for safeguarding physical and virtual networks, reducing risks, and ensuring compliance Discover the essential practices and strategies to protect your network Network security management: Components & features Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is network security management and why do we need it? Who owns network security management and why does it matter? What are the high-stakes tasks in network security management? What are the toughest challenges of network security management? Which approaches do network security management pros use? Which network security management tools are IT pros’ secret weapons? Where do network security management tools make the biggest difference? Network security management FAQs Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Increase Cisco ACI adoption with AlgoSec - AlgoSec

    Increase Cisco ACI adoption with AlgoSec Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec ObjectFlow Optimizing policy automation through effective object management - AlgoSec

    AlgoSec ObjectFlow Optimizing policy automation through effective object management Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Partner solution brief Manage secure application connectivity within ServiceNow - AlgoSec

    Partner solution brief Manage secure application connectivity within ServiceNow Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Secure application connectivity across your hybrid environment - AlgoSec

    Secure application connectivity across your hybrid environment E-BOOK Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Business-driven Security Management For Local Governments - AlgoSec

    Business-driven Security Management For Local Governments Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec Resident Engineer (ARE) - AlgoSec

    AlgoSec Resident Engineer (ARE) Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | Q1 at AlgoSec: What innovations and milestones defined our start to 2026?

    As we close out the first quarter of 2026, I find myself reflecting on a start to the year that was defined by product momentum, stronger market validation, growing trust from regulated organizations, and meaningful industry recognition. In just three months, AlgoSec introduced important platform enhancements, published fresh research on where network security is heading, strengthened its standing with government and highly regulated customers, and closed the quarter with three major awards.... AlgoSec Reviews Q1 at AlgoSec: What innovations and milestones defined our start to 2026? Adel Osta Dadan 2 min read Adel Osta Dadan Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 4/5/26 Published As we close out the first quarter of 2026, I find myself reflecting on a start to the year that was defined by product momentum, stronger market validation, growing trust from regulated organizations, and meaningful industry recognition. In just three months , AlgoSec introduced important platform enhancements, published fresh research on where network security is heading, strengthened its standing with government and highly regulated customers, and closed the quarter with three major awards. More importantly, Q1 reinforced something we believe strongly: the market is moving toward security that is more application-centric, more automated, and more aligned with business reality. January – Removing friction across hybrid and multi-cloud security We opened the year with the release of A33.20, a meaningful step forward for the AlgoSec Horizon platform. The focus of this release was practical and timely: help security teams move faster without losing visibility, control, or confidence. As hybrid environments continue to grow more complex, policy changes are happening under tighter timelines and with higher business stakes. A33.20 was built to reduce that friction by simplifying workflows , improving visibility across AWS, Azure, Google Cloud, and Palo Alto Networks environments , automating more of the change process, and evaluating risk and compliance in the context of enterprise applications rather than as disconnected technical issues. What stood out most to me about this release was not just the feature list, but the direction behind it. Security teams do not need more noise. They need better context, clearer prioritization, and safer execution. With A33.20, we kept pushing toward a model where security policy management becomes more intelligent, more business-aware, and far less dependent on manual, error-prone work. That is the standard modern enterprises are increasingly demanding, and it set the tone for our quarter. February – Turning market insight and trust into momentum In February, we released the 2026 State of Network Security Report , and the findings made one thing very clear: the market is entering a new phase. Based on more than 500 responses across 28 countries, the report showed that organizations are looking for consolidation, unification, automation, and control as they navigate rapid cloud expansion, distributed workloads, and AI-driven traffic patterns. It also showed how quickly the environment is changing: 65% of respondents said they had already adjusted their strategies in response to AI-powered attacks, and 54.7% said security capabilities are now the most important factor when selecting a cloud platform. That market shift was reflected in our own momentum. In February, AlgoSec reported its best year ever , with gross dollar retention above 90%, 37% year-over-year new business growth in 2025, and more than 100 customers implementing the Horizon platform within months of its launch . March – Three awards that told one bigger story March brought a level of external validation that made the quarter feel complete. First, the 2026 Globee Awards for Cybersecurity named AlgoSec Horizon the Gold winner and Best of Category for Risk and Policy Management Solution . For us, that recognition validated the value of helping customers cut through fragmented environments with unified visibility across cloud and on-prem networks, automate policy management safely, and prioritize remediation in the context of real business applications. That recognition was followed by Cyber Defense Magazine’s 2026 Global InfoSec Award for Trailblazing AI-Powered Cybersecurity Solutions , published as part of its RSAC/March 2026 issue. This award mattered for a different but equally important reason. It reinforced that our AI strategy is not about adding another feature or another layer of alerts. It is about changing how security is managed: using AI to understand applications, prioritize risk based on business impact, and help teams implement the right policies across multi-cloud and on-prem environments. The capabilities highlighted internally — AppViz, AI risk prioritization, Intelligent Policy, and the Algo AI Assistant — reflect that broader shift from reactive security operations to intelligent, application-aware automation. Then came the 2026 SC Award for Best Risk/Policy Management Solution . What I especially appreciate about this recognition is that it reinforced the completeness of the platform story. SC Media highlighted AlgoSec’s application-centric approach across virtual, cloud, and physical environments, with a judge’s emphasis on the clarity of the overall offering and its fit for the enterprise environment. Together with the Globee recognition , the SC Award strengthened the message that risk and policy management today must be tied to application context, business impact, and real operational execution, not just rule sprawl or isolated controls. Taken together, these three awards told one bigger story about who we are and where the market is heading. Two awards validated our strength in risk and policy management. One validated our leadership in AI-powered cybersecurity innovation. All three pointed to the same underlying differentiation: AlgoSec does not treat applications, risk, and policy as separate problems. We connect them in one platform, helping organizations gain visibility, reduce manual effort, accelerate delivery, and maintain continuous compliance across hybrid environments. Looking ahead If Q1 is any indication, 2026 will be a year defined by consolidation . Security teams are being asked to move faster, manage more complexity, and prove business value more clearly than ever before . Our responsibility is to help them do exactly that with better visibility, smarter automation, stronger compliance, and a security model built around how applications actually work. That is the direction we have been building toward, and Q1 gave us strong proof that it is the right one. We are proud of how the year has begun, but even more energized by what comes next. The momentum from this quarter gives us a strong foundation for the rest of 2026, and we remain focused on helping enterprises simplify security management, reduce risk, and secure application connectivity without slowing the business down. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Firewall audit checklist for security policy rules review | AlgoSec

    Ensure your network security is up to par with a comprehensive firewall audit checklist. Review and optimize security policy rules to prevent vulnerabilities. Firewall audit checklist for security policy rules review ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

  • AlgoSec FireFlow – Automate and secure policy changes | AlgoSec

    Automate and secure network policy changes with AlgoSec FireFlow. Streamline workflows, ensure compliance, and reduce risks in your security environment. AlgoSec FireFlow – Automate and secure policy changes ---- ------- Schedule a Demo Select a size ----- Get the latest insights from the experts Choose a better way to manage your network

  • One fabric every app - AlgoSec

    One fabric every app Download PDF Download PDF Add a Title Add a Title Add a Title Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue Talk to a Skybox transition expert. Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

bottom of page