Tag "Firewall"

Back to homepage
Software

Four Steps To Firewall Automation Success

Firewall automation projects are seemingly all the rage these days, with everyone looking to automate at least some portion of the process. Usually, the goal is to save time and

Identity Theft

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best IT security directors will confess that

Hardware/Network

Accept the death of the traditional enterprise network: Your security may depend upon it

Today, the enterprise “network” is mobile and accessed through devices by multiple users, with a lot of the services being used served via the cloud that bypass traditional network parameters.

Hardware/Network

Global Survey Shows Companies Are Using More Automation in Cybersecurity, But Still Have Work to Do

Skybox® Security, a global leader in cybersecurity management, has released the results of a global survey conducted by Osterman Research, Understanding Security Processes and the Need to Automate. The survey, which includes responses

Hardware/Network

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future. Traditional firewalls track

Hardware/Network

Firewall Still Critical Tool in Network Security

The increased number of firewalls within security infrastructures has created challenges, leaving many organizations struggling with basic firewall management, according to a new report from FireMon. In its fourth annual

Industry Insights

10 Ways to Boost Your Business’s Cybersecurity

With the frequency of data breaches and attacks on the rise, it’s no longer an option for companies to have a weak defense to secure themselves against these cyberattacks. Just

Industry Insights Software

Real Security is a Question of Business Value

If you’re a CISO, you’ve probably wrestled with placing a monetary value on your exposure to cyber-attacks. For example, if your organization was breached thanks to a phishing campaign, how

Identity Theft

How did the TimeHop data breach happen?

Compromise of an employee’s credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts

Software

Phishing in the Deep End: The Growing Threat of Attacks Beyond Email

Phishing has long posed a threat to businesses thanks to attackers who convince users to open harmful email attachments and executable links. As a result, companies have strengthened malware blocking