February 21, 2017 Added by:Dean Wiech
Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.
February 07, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
October 25, 2016 Added by:Myk Konrad
With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.
October 18, 2016 Added by:Eduard Kovacs
Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.
September 30, 2016 Added by:Joe Weiss
Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).
September 23, 2016 Added by:Avishai Wool
Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.
September 23, 2016 Added by:Tom Wayne
The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.
September 07, 2016 Added by:Roy Samson
The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.
August 12, 2016 Added by:Peter Tsai
Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.
August 11, 2016 Added by:Avishai Wool
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.
June 15, 2016 Added by:Ajit Sancheti
Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.
May 24, 2016 Added by:Brian Soldato
User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.
April 26, 2016 Added by:Jim Legg
While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015