Network Security
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
Universities Beware! The Biggest Security Threats Come from Within the Network
January 08, 2019 Added by:Victor Danevich
While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.
Comments (0)
Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)
October 09, 2018 Added by:Eduard Kovacs
Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.
Comments (0)
U.S. Now Leads by Number of DDoS Botnet C&C Servers
July 25, 2018 Added by:Ionut Arghire
The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.
Comments (0)
Intent Based Networking: Turning Intentions into Reality
July 16, 2018 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.
Comments (0)
Infrastructure Under Attack
May 31, 2018 Added by:Tom Bienkowski
Any organization that delivers services over the web needs strong, purpose-built DDoS protection.
Comments (0)
Achieving Effective Application Security in a Cloud Generation
May 16, 2018 Added by:Jonathan Bregman
Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.
Comments (0)
A Siri for Network Security: How Chatbots Can Enhance Business Agility
March 19, 2018 Added by:Avishai Wool
Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring
Comments (0)
Cybersecurity’s Dirty Little Secret
December 06, 2017 Added by:Jackson Shaw
An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.
Comments (0)
Category #1 Cyberattacks: Are Critical Infrastructures Exposed?
November 07, 2017 Added by:Jalal Bouhdada
Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.
Comments (0)
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
November 03, 2017 Added by:Jonathan Bregman
The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.
Comments (0)
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
November 03, 2017 Added by:Sanjay Ramnath
Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.
Comments (0)
Is Your “Father’s IAM” Putting You at Risk?
October 13, 2017 Added by:Jackson Shaw
Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.
Comments (0)
Don’t get lost in translation when managing mixed firewall estates
June 27, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks
Comments (0)
Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!
June 14, 2017 Added by:Mike Lennon
What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!
Comments (0)
Convenience vs. Control: Achieving the Right Security Balance
May 12, 2017 Added by:Kevin Cunningham
By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.
Comments (0)
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019