Our Mesh7 team talks about a unique approach to application security is required, as modern apps have become much more vulnerable due to increased data in motion.

Security hygiene is like your immune system: bad habits can lead to the breakdown of your immune system and greater susceptibility to viruses.

Once a year, we get together with our industry peers and friends at the Summit, which was focused on reimagining infrastructure in a distributed era. Watch all the talks from the stellar lineup of speakers. [VIDEOS]

During the discussion with members of The Fabric CXO Council, performance, security, and compliance were on top of CXOs minds.

Once we co-create a new company with founders, the next step is a search for the CEO. We are excited for Mesh7 to get Gary as CEO.

Prabakar’s last blog in the series of five posts summarizes the ways that infrastructure itself and applications are being decentralized.

Take a look into why enterprises must look beyond microsegmentation for their cloudsecurity.

Prabakar shares in his fourth blog how de-centralization via distributing trust across participants using blockchain technology in business transactions is driving some new infrastructure and business model innovations.

Mesh7 (prev. Kavach), Cloud Native Application Security Mesh landed funding from the newly formed Splunk’s venture arm.

Data security breaches are on the rise, especially when it comes to distributed applications. Read what are some of the best practices to avoid being breached.