Network->General

259aa33b32fc31717e8a18f2dc9edc19

Make It So: Accelerating the Enterprise with Intent-Based Network Security

June 13, 2020 Added by:Avishai Wool

How organizations can realize the benefits of intent-based networking across their hybrid networks.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

Modernizing Web Filtering for K-12 Schools

December 18, 2019 Added by:Timur Kovalev

Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

5 Limitations of Network-Centric Security in the Cloud

August 19, 2019 Added by:Sanjay Kalra

Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Now Leads by Number of DDoS Botnet C&C Servers

July 25, 2018 Added by:Ionut Arghire

The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

E3e74019f2aa960c12029bbad242eca3

How to Choose the Right EDR solution for Your Organization

September 23, 2016 Added by:Tom Wayne

The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.

Comments  (0)

Abc3973c3c7b09ae835fd09e06a4519f

Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)

7a381426c4258d879207e4550cc28f12

Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices

May 24, 2016 Added by:Brian Soldato

User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

5af5a92f9548968dc33daa522c823aa1

3 Requirements for Effective Security Investigations

April 15, 2016 Added by:Tomer Saban

In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »