Tag "Firewall"

Back to homepage
Hardware/Network

Latest trends in automated threat intelligence-driven network security

Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd Weller, Chief Strategy

Software

WordPress Plugin Vulnerability Allows Website Takeover

This week seems to be super busy with data breaches and security vulnerabilities galore, looping you in on the latest vulnerability exposed today. News is breaking that hackers are exploiting

Hardware/Network

Access Control Lists: 6 Key Principles to Keep in Mind

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come. In an industry of constant, rapid

Hardware/Network

5 New Year’s Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape

Software

Most concerning security controls for cyberattackers? Deception and IDS

Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish

Hardware/Network

7 Real-Life Dangers That Threaten Cybersecurity

Cybersecurity tends to focus on dangers that appear on networks or in messages. The attackers may be half a world away, so the threat is the only thing that matters.

Hardware/Network

Managing Firewalls in the Cloud: do Companies Know Enough About Security Intent?

How businesses are building firewalls is changing. We’re seeing a continued trend toward smaller firewall boundaries and micro-segmentation to support zero-trust strategies, although it can be very piecemeal. As businesses

Software

Four Steps To Firewall Automation Success

Firewall automation projects are seemingly all the rage these days, with everyone looking to automate at least some portion of the process. Usually, the goal is to save time and

Identity Theft

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best IT security directors will confess that

Hardware/Network

Accept the death of the traditional enterprise network: Your security may depend upon it

Today, the enterprise “network” is mobile and accessed through devices by multiple users, with a lot of the services being used served via the cloud that bypass traditional network parameters.