<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2849132&amp;fmt=gif">
Implementing CTEM Microsegmentation: A Practitioner's Guide to Deployment, Compliance, and Measurable Results (Part 2 of 2)
Network Segmentation CTEM Planning

Implementing CTEM Microsegmentation: A Practitioner's Guide to Deployment, Compliance, and Measurable Results (Part 2 of 2)

Feb 2, 2026 11:27:31 AM 7 min read
How Can You Improve IoT Device Visibility on My Network?
IoT Device Visibility Solutions

How Can You Improve IoT Device Visibility on My Network?

Jan 30, 2026 2:36:58 PM 19 min read
Microsegmentation as the Control Plane for CTEM: Why Exposure Intelligence Needs Enforcement Architecture (Part 1 of 2)
CTEM and Microsegmentation Cybersecurity Architecture

Microsegmentation as the Control Plane for CTEM: Why Exposure Intelligence Needs Enforcement Architecture (Part 1 of 2)

Jan 26, 2026 10:25:10 AM 11 min read
How to Stop Lateral Movement in Black Basta, Akira, and LockBit Ransomware Attacks
Medical Device Security

How to Stop Lateral Movement in Black Basta, Akira, and LockBit Ransomware Attacks

Jan 20, 2026 12:17:53 PM 17 min read
Aligning CMMC 2.0 with Network Security and Lateral Movement Prevention
CMMC 2.0 with Network Security

Aligning CMMC 2.0 with Network Security and Lateral Movement Prevention

Jan 6, 2026 9:45:30 AM 13 min read
Elisity Release 16.14: Network Traffic Analytics That Actually Help You Make Decisions
Elisity Release 16.14 Network Traffic Analytics

Elisity Release 16.14: Network Traffic Analytics That Actually Help You Make Decisions

Nov 24, 2025 10:55:35 AM 3 min read