The time is now for a comprehensive, risk-based approach to build cyber resilience

As one who attends many industry conferences, it’s almost a guarantee that you will hear the cliché question “What issue keeps you up at night?” posed to enterprise security executives on stage. While the question may be monotonous, the responses Continue reading The time is now for a comprehensive, risk-based approach to build cyber resilience

DIY Not the Best Approach to SD-WAN

Wide area networks (WANs) were not designed for the load that most enterprises need them to handle today. Demand for data across the distributed enterprise is growing exponentially; virtually all enterprises are using cloud technology in some form; and the Continue reading DIY Not the Best Approach to SD-WAN

How 3 innovative products approach network security

A few years ago, almost all enterprise cyber security products were centered within the network security category. Protecting the backend servers that ran organizations was everything. Even today, with an increased focus on cloud, virtualization and enterprise-level endpoint security, protecting Continue reading How 3 innovative products approach network security

finding maximum element of a list – divide and conquer approach

Here I share my Python implementation of divide and conquer approach of finding maximum element from a list : “””Divide and conquer approach to find the maximum from a list”””def find_max(li, left, right): if left == right: return li[left] mid Continue reading finding maximum element of a list – divide and conquer approach