Mainframe March 16, 2016 Evolving Threats: Why Deep Packet Inspection Is Critical for Intrusion Prevention 3 min read - Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.
Network March 15, 2016 Security and the Virtual Network: Part I 2 min read - Virtual networks are becoming a popular choice for enterprises due to their flexibility, but it's not simple to select the right option.
Intelligence & Analytics February 8, 2016 The Secret Sauce of a Successful Security Platform 3 min read - What ingredients make up the recipe for your perfect security platform? Any list should begin with network and endpoint protection.
February 4, 2016 WirelessHART Networking Technology Products Have Vulnerabilities, Researchers Say 2 min read - Products with WirelessHART networking technology have vulnerabilities that are not yet patched, which could expose industrial systems to significant risk.
Cloud Security February 2, 2016 Tor: What Lies Beneath the Onion’s Skin 3 min read - Many people have heard of Tor, or The Onion Router, but how many actually know the details of this privacy tool and how it came to be?
November 25, 2015 Encryption and the Internet of Things: Mission Impossible? 2 min read - Researchers have again defeated the Algebraic Eraser, used to encrypt devices on the Internet of Things. Is security impossible on the IoT?
Endpoint November 25, 2015 Mobile Devices: Handling the Holiday Rush 3 min read - Your employees will likely return from the holidays with a host of new mobile devices. How do you protect your corporate network when this comes to pass?
November 12, 2015 Pride and Privileges: IT Professionals Struggle With Credential Compromise 3 min read - IT professionals are tasked with managing the varying levels of access employees have to corporate data, which is a tall task for any security pro.
November 11, 2015 Friday Is Peak Malware Distribution Day, Study Shows 3 min read - Malware distribution tends to peak on Friday, according to a new study from Cyren. Here's what else the report had to say about cyberthreats.
Endpoint November 5, 2015 What’s the Difference Between Mobile, Wearables and a Luggage Tag When It Comes to Security? 3 min read - Mobile devices and endpoints still remain the main gateways for wearables to interact with the wider IT environment, and all must be secured.