Back to homepage

Making Network Security DevOps Friendly

DevOps is all about agility, with fast, short delivery cycles and automation for software development and applications. Enabled by recently-introduced technologies such as virtualization, cloud and SDN, spinning up new

Five key security tips to avoid an IoT hack

Recently, Russian PIR Bank lost $1,000,000 because of a compromised router that allowed hackers to gain entry into their local network. Why did it happen and how companies can protect themselves?  Malicious

Protecting Data in the Era of IoT

The use and adoption of IoT devices is continuing to grow at break-neck speed. In fact, IHS Markit recently predicted that the number of IoT devices will balloon to 125 billion by

How AI Can Tame and Control Shadow IT in the Enterprise

‘Shadow IT’, usually described as “information-technology systems and solutions built and used inside organizations without explicit organizational approval”, offers cyber-criminals an easy entry point into corporate systems and is now

The Importance of Access Control for IoT Devices

Cybercriminals are actively increasing their focus on IoT devices, with the latest variant of the Hide ‘N Seek malware expanding its focus to include, for the first time, home automation devices.

Persistent DDoS Attacks Evolve at Internet Scale

Attackers are harnessing the power of the internet, leveraging the proliferation of devices in the ever-expanding internet of things (IoT) to launch terabit-per-second–scale distributed denial-of-service (DDoS) attacks, according to NETSCOUT’s 2018 Threat Intelligence

Could AI be the ‘silver bullet’ to cybersecurity?

Three quarters of IT decision makers believe AI and ML are the silver bullet to cybersecurity challenges. New research from the cybersecurity firm ESET has revealed that the recent hype surrounding AI

Untangle Survey Finds SMBs Rank Network Security as Top IT Concern

Untangle®, Inc., a leader in comprehensive network security for small-to-medium business (SMB), today released the results of their first annual SMB IT Security Report. The findings explore IT security apprehensions for small and

Addressing IoT Device Security Head-on

The Mirai botnet exposed very publicly how weaknesses in IoT devices can be used to create wide-scale Internet outages. Since then, other botnets based on Mirai have emerged, and now

The Two-Step Process to Fix the Internet’s Identity Problem

In today’s digital world there are nearly 23.14 billion connected devices. Employees across the globe are using these devices to do everything from check personal and corporate emails to access corporate