Network->General
Avoiding Fuelling the Cyber-Crime Economy
August 11, 2020 Added by:Marc Wilczek
What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity?
Comments (0)
Make It So: Accelerating the Enterprise with Intent-Based Network Security
June 13, 2020 Added by:Avishai Wool
How organizations can realize the benefits of intent-based networking across their hybrid networks.
Comments (0)
When Data Is Currency, Who’s Responsible for Its Security?
February 11, 2020 Added by:Jason Bevis
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?
Comments (0)
Modernizing Web Filtering for K-12 Schools
December 18, 2019 Added by:Timur Kovalev
Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.
Comments (0)
5 Limitations of Network-Centric Security in the Cloud
August 19, 2019 Added by:Sanjay Kalra
Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.
Comments (0)
U.S. Now Leads by Number of DDoS Botnet C&C Servers
July 25, 2018 Added by:Ionut Arghire
The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.
Comments (0)
We Can’t Control Devices and People, but We Can Control the Network
April 26, 2017 Added by:Dennis Reilly
Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.
Comments (0)
The Third Party Threat
February 16, 2017 Added by:Michael Patterson
A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.
Comments (0)
Winter Is Coming: Forget the Firewall and Layer Up
October 25, 2016 Added by:Myk Konrad
With the holidays around the corner, bundling up on security is the best thing you can do to protect your revenue from the cold realities of cybercrime.
Comments (0)
Going Global: Three Key Strategies for Managing International Firewalls
September 23, 2016 Added by:Avishai Wool
Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.
Comments (0)
How to Choose the Right EDR solution for Your Organization
September 23, 2016 Added by:Tom Wayne
The need for an Endpoint Detection and Response (EDR) solution is at its highest for any organization who wants to ensure they are as protected as possible from the threat of attack.
Comments (0)
Advanced Threat Protection Technologies Beyond Marketing
September 07, 2016 Added by:Roy Samson
The right Advanced Threat Protection technology choices depend on your current and target IT architecture. It is also important not to be tempted to base your decision for a specific security product owing to a small unique ‘sales/marketing’ feature.
Comments (0)
Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices
May 24, 2016 Added by:Brian Soldato
User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.
Comments (0)
Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?
April 26, 2016 Added by:Jim Legg
While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.
Comments (0)
3 Requirements for Effective Security Investigations
April 15, 2016 Added by:Tomer Saban
In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.
Comments (0)
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids