Articles by Yoshio Turner

VOIP and the Security Service Edge

The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations today.  While that statement seems obvious, it can be used to quickly...