Network Security

41d5440f596e714d7ca33eccabc5fcab

Access Management and the Automation of Things

February 21, 2017 Added by:Dean Wiech

Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Managing External Connectivity to and From Your Network: Do’s & Don’ts

February 07, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

The Forgotten Security Frontier: The Phone Call

January 23, 2017 Added by:Myk Konrad

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

Winter Is Coming: Forget the Firewall and Layer Up

October 25, 2016 Added by:Myk Konrad

With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2016 ICS/SCADA Cyber Security Conference – Oct. 24-27

October 18, 2016 Added by:Eduard Kovacs

Security professionals from various industries will gather next week at the 2016 edition of SecurityWeek’s ICS Cyber Security Conference, the longest-running event of its kind. The conference takes place on October 24-27 at the Georgia Tech Hotel & Conference Center in Atlanta, Georgia.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Demonstration of Destructive Cyberattack Vector on “Air-gapped” Systems

September 30, 2016 Added by:Joe Weiss

Alex McEachern from Power Standards Laboratory will provide a hands-on demonstration of two types of attack-to-failure of a real, air-gapped ICS at the October ICS Cyber Security Conference (www.icscybersecurityconference.com).

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Going Global: Three Key Strategies for Managing International Firewalls

September 23, 2016 Added by:Avishai Wool

Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.

Comments  (0)

E3e74019f2aa960c12029bbad242eca3

How to Choose the Right EDR solution for Your Organization

September 23, 2016 Added by:Tom Wayne

The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Automating Access May Be Best for Remote Users

September 21, 2016 Added by:Dean Wiech

When you are working remotely, things need to be very convenient, otherwise it becomes a huge aggravation of dealing with technical issues before you can get anything for work or school completed.

Comments  (0)

Abc3973c3c7b09ae835fd09e06a4519f

Advanced Threat Protection Technologies Beyond Marketing

September 07, 2016 Added by:Roy Samson

The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.

Comments  (0)

22fcacf8b2a3c4d53529ef41c1df504a

Keep IT Safe: 5 Ways to Guard Against Olympic-Sized Streaming Threats

August 12, 2016 Added by:Peter Tsai

Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks

August 11, 2016 Added by:Avishai Wool

Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

Why Your Next Generation Firewall Cannot Prevent Next Generation Threats

June 15, 2016 Added by:Ajit Sancheti

Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.

Comments  (0)

7a381426c4258d879207e4550cc28f12

Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices

May 24, 2016 Added by:Brian Soldato

User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »