Network->General

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

E3e74019f2aa960c12029bbad242eca3

How to Choose the Right EDR solution for Your Organization

September 23, 2016 Added by:Tom Wayne

The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.

Comments  (0)

Abc3973c3c7b09ae835fd09e06a4519f

Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)

7a381426c4258d879207e4550cc28f12

Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices

May 24, 2016 Added by:Brian Soldato

User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

5af5a92f9548968dc33daa522c823aa1

3 Requirements for Effective Security Investigations

April 15, 2016 Added by:Tomer Saban

In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Carrier Grade NAT and the DoS Consequences

December 16, 2015 Added by:Stefan Fouant

Through the use of dedicated DDoS mitigation devices, Carrier Grade NAT devices and their associated customers are protected from service disruptions, while still ensuring legitimate traffic is allowed unencumbered.

Comments  (0)

B1ea789c3db7f59b11f88e8980c38e7b

CISOs: Five Ways to Ramp Up Your Security Strategy

December 08, 2015 Added by:Kirsten Bay

Where is a cyber security professional to begin when the stakes are set against the corporation? The key is better preparation. Below are five steps that will provide an approach to help build a strategy that offers the potential to outsmart the attacker.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Is DDoS Mitigation as-a-Service Becoming a Defacto Offering for Providers?

November 11, 2015 Added by:Stefan Fouant

In my daily engagements with various customers of all shapes and sizes, it’s truly interesting to see how the approach to DDoS mitigation is changing. Much of this is the result of DDoS mitigation services shifting from a “nice to have” technology to a “must-have”, essential in order to maintain business continuity and availability.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

How Well Do You Really Know Your Network?

October 06, 2015 Added by:Dan Lohrmann

Recent data breaches, and the international emphasis on critical infrastructure protection, are helping raise awareness of the importance of technology infrastructure improvements. Many organizations are currently building “next-generation” networks with new projects that are well funded. Don’t waste any opportunity to reinvent your network or infrastructure when you get the chance.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »