Industry Insights

Six Ways Agentic AI Will Transform Networking and Security

Kevin Sheu
By Kevin Sheu
VP of Product Marketing
March 24, 2025

Discover how agentic AI enhances threat detection, network optimization, Zero Trust security, and policy management. Learn how VersaAI Labs is driving AI-powered security innovation.

Shadow AI & Data Leakage: How to Secure Generative AI at Work

Rahul Mehta
By Rahul Mehta
Product Marketing Analyst
March 17, 2025

Shadow AI is exposing businesses to security risks and data leaks. Learn how to secure Generative AI usage with governance, AI firewalls, and compliance controls.

Addressing the OWASP Top 10 for LLM Applications

Rahul Mehta
By Rahul Mehta
Product Marketing Analyst
March 5, 2025

OWASP Top 10 for Large Language Model (LLM) Applications, highlighting critical security vulnerabilities such as prompt injection, data poisoning, and system prompt leakage. It emphasizes the need for proactive security measures, including Zero Trust principles, access controls, and continuous monitoring to protect AI-driven applications from emerging threats.

When Faster Isn’t Better: How Per-Packet Load Balancing Throttles Your Critical Traffic

Tayo Ogunseyinde
By Tayo Ogunseyinde
Systems Engineer
February 12, 2025

Imagine your network as a highway. Per-packet load balancing splits your data into tiny cars and sends them down multiple lanes, promising faster speeds. But what if some lanes have hidden potholes and traffic jams? For TCP, the protocol powering most of your critical apps, per-packet load-balancing can backfire spectacularly.

How NGFW Fits into Your Zero Trust Strategy

Brad LaPorte
By Brad LaPorte
Strategic Advisor
February 5, 2025

Zero Trust requires organizations to assume that threats can originate from anywhere—both inside and outside the network. This approach emphasizes strict identity verification and continuous monitoring to protect sensitive resources. Advanced security tools, such as Next-Generation Firewalls (NGFWs), play a pivotal role in implementing this strategy. These technologies provide enhanced visibility and granular access control to meet the demands of hybrid and cloud-first environments.

IoT: New Horizons, New Risks 

Jon Taylor
By Jon Taylor
Director and Principal of Security, Versa Networks
January 7, 2025

The Internet of Things (IoT) offers exciting new opportunities for growth and innovation. From fostering collaboration between organizations to enabling entirely new services, IoT is at the heart of many technological revolutions.  

ISACA Survey Points to Growing Threats and Lack of Automation 

Kevin Sheu
By Kevin Sheu
VP of Product Marketing
October 14, 2024

This latest survey is more confirmation that an oft-mentioned reality continues to be true – that the nature of threats keeps advancing and organizations frequently find themselves falling further and further behind. Far and away, the top reason given for increased stress isn’t low budgets or lack of training or failure of company leadership to prioritize security – even though these are among the reasons cited – it’s the “threat landscape is increasingly complex,” listed by 81 percent of respondents, nearly double the next-closest response.

Protect & Reduce Attack Surface at the Network Edge

Brad LaPorte
By Brad LaPorte
Strategic Advisor
September 12, 2024

Understanding the cyber attack surface Historically, the “attack surface” was limited to well-known points of external exposure—the traditional perimeter of websites, external IP addresses, and endpoints. Our cyber attack surface has expanded dramatically over the past five years, now encompassing our cloud estate, millions of devices at the edge, and mobile and remote workers, in addition to our internet-facing infrastructure. This expansion of the definition to include cloud, end-user, and internal assets has been driven by the increasing sophistication of cyber attacks. The table below breaks down today’s complex attack surface into several categories, based on a framework presented by…

What is Zero Trust Security? | Core Principles of Zero Trust Model

Janak Panchal
By Janak Panchal
Strategy Analyst
August 15, 2024

Zero Trust is a cybersecurity paradigm that assumes no user, device, or network segment is inherently trustworthy—even if it’s inside the corporate perimeter. Instead of granting implicit trust based on location or network membership, Zero Trust requires every access attempt to be verified and authorized, reducing the attack surface and preventing lateral movement by attackers.

CrowdStrike Outage: Latest Updates and Best Practices 

Naganathan S J
By Naganathan S J
Staff Security Engineer - Research
July 19, 2024

Today, CrowdStrike reported a significant outage affecting multiple services, including their Falcon platform. The CrowdStrike team is actively working to resolve the issue and restore full functionality. Users are advised to monitor CrowdStrike’s official status page for real-time updates and follow any recommended actions provided by the company.


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.