Tag "Firewall"

Back to homepage
Software

The importance of an integrated security strategy

Integrated security strategies with complementary solutions are more effective than multiple layers of complex protection software One of the biggest challenges facing the security industry is joined-up thinking. With so

Hardware/Network

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of

Software

The cyber threat hunting game has changed

Threat hunting has evolved into a modern day sport, as cybersecurity companies scour the Dark Web to be the first to define a new vulnerability, type of malware or attack

Vendor News

IT ops and engineering are embracing automation to increase business agility

Based on a survey of nearly 700 engineering and operations individuals globally, a report by Indeni and GNS3 reveals a programming knowledge gap that is having an impact on the

Industry Insights

Why developing an internal cybersecurity culture is essential for organizations

ENISA published a report providing organisations with practical tools and guidance to develop and maintain an internal cybersecurity culture. The Cybersecurity Culture in Organisations report is based on a multi-disciplinary

Hardware/Network

Fine-tuning Firewall Rules: 10 Best Practices

When it comes to network firewall configuration, security administrators face the tough challenge of balancing the need for strong security with business users’ need for fast performance.The stakes couldn’t be

Cloud

API Security Concerns Are on the Rise

In an application-centric, cloud-native world, businesses have a heightened concern for cybersecurity risk related to API use of late: Specifically, 63% of respondents in a recent survey said they are

Identity Theft

Building a coping mechanism for data breaches

Data breaches may be daily news, but they will always be a significant worry for business stakeholders. It is the IT team, however, that have to deal with the technical

Hardware/Network

Thousands of critical systems affected by serious security flaws

Multiple and serious vulnerabilities have been found in a software management system widely used in corporate and industrial control environments, researchers warn Security researchers have identified 14 vulnerabilities in a

Software

Escape future ransomware attacks by leveraging the right technology

Last year, multiple industry verticals saw the extreme effects of ransomware, with WannaCry and Petya leading the pack in terms of damage. To make matters worse, according to a report