Data Protection January 9, 2019 Deciphering the Encryption Paradox 2 min read - The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.
Incident Response December 11, 2018 Why You Need a BGP Hijack Response Plan 5 min read - BGP hijack attacks are increasing in popularity, but are still largely unaddressed in many organizational incident response plans.
Intelligence & Analytics November 9, 2018 Why You Should Start Leveraging Network Flow Data Before the Next Big Breach 4 min read - One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.
Endpoint July 24, 2018 BYOD: Are Thousands of Rogue Devices Lurking on Your Network? 3 min read - While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.
Network November 30, 2017 The History and Reinvention of NAC 2 min read - Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.
Network September 27, 2017 What Do Recent Attacks Mean for OT Network Security? 11 min read - Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
Network August 24, 2017 Getting Ahead of SD-WAN Security With the Zero Trust Model 2 min read - According to recent studies, security is the top concern among organizations implementing software-defined wide area network (SD-WAN) technology.
Network July 20, 2017 The Living Dead: How to Protect Legacy Systems 2 min read - When patching legacy systems is simply not an option, security teams must take steps to minimize the risks associated with outdated software.
Network June 30, 2017 SD-WAN: Improve Security and Reduce Cost While Complying with Payment Card Industry Standards 6 min read - SD-WAN technologies are transforming the way enterprise retailers approach connectivity and implementation of security functions at branch locations.
Endpoint June 5, 2017 Four Key Considerations for Managing Your IoT Population 3 min read - To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.