October 19, 2017 Sniffing Out Snoops to Improve Network Security for Business 2 min read - In a recent survey, security professional and executives admitted to snooping on enterprise data. How can companies improve network security for business?
Data Protection September 29, 2017 Back to Filing Cabinets? Simplifying the Complex Task of Data Security 3 min read - Without visibility into all data stored on the network, the complex task of data security can have IT teams pining for the bygone days of filing cabinets.
CISO September 29, 2017 Getting an Earful: Convincing Employees to Care About Network Security 3 min read - When scare tactics and strict security policies fall on deaf ears, CISOs must find more productive ways to educate employees about network security risks.
Network September 27, 2017 What Do Recent Attacks Mean for OT Network Security? 11 min read - Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
Network August 30, 2017 Keep Intruders Out of Your Network With Proactive Threat Hunting 3 min read - Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.
Network August 24, 2017 Getting Ahead of SD-WAN Security With the Zero Trust Model 2 min read - According to recent studies, security is the top concern among organizations implementing software-defined wide area network (SD-WAN) technology.
August 22, 2017 Pulse Wave Techniques Allow Cybercriminals to Quickly Ramp Up DDoS Attacks 2 min read - The traditional slow crescendo of malicious traffic in DDoS attacks is being replaced by a technique that hits organizations in multiple places at once.
Intelligence & Analytics August 11, 2017 Advanced Approaches to ATM Network Protection 3 min read - Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.
Application Security August 2, 2017 Integrating the IoT Into Your Application Security Program 3 min read - Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.
July 25, 2017 New Emotet Trojan Feature Spreads Malware on Internal Networks 2 min read - Researchers discovered a new variant of the Emotet Trojan that spreads across internal networks and serves as a downloader for other banking Trojans.