Tag "Firewall"

Back to homepage
Hardware/Network

How DNS firewalls can burn security teams

It’s easy to see how DNS firewalls could have thwarted 33% of data breaches. For most IT and security teams, DNS has been an afterthought. Or, worse, not even that.

Industry Insights

How the Healthcare Industry can Improve Online Trust

Privacy on the internet is important in all industries, but none more so than the healthcare sector, which handles mass amounts of online health data daily. While any data loss (financial,

IT Compliance

Why Zero Trust is Crucial to Compliance

The enterprise faces a brand new world when it comes to data privacy and security. New regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act

Artificial Intelligence

Organizations investing in security analytics and machine learning to tackle cyberthreats

IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their organization’s intent to acquire advanced security

Hardware/Network

Latest trends in automated threat intelligence-driven network security

Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd Weller, Chief Strategy

Software

WordPress Plugin Vulnerability Allows Website Takeover

This week seems to be super busy with data breaches and security vulnerabilities galore, looping you in on the latest vulnerability exposed today. News is breaking that hackers are exploiting

Hardware/Network

Access Control Lists: 6 Key Principles to Keep in Mind

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come. In an industry of constant, rapid

Hardware/Network

5 New Year’s Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape

Software

Most concerning security controls for cyberattackers? Deception and IDS

Attivo Networks surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish

Hardware/Network

7 Real-Life Dangers That Threaten Cybersecurity

Cybersecurity tends to focus on dangers that appear on networks or in messages. The attackers may be half a world away, so the threat is the only thing that matters.