Tag "Network Security"

Back to homepage
Hardware/Network

How Digital Transformation can Save Cybersecurity

Traditional security controls, now too manual and slow to keep pace with digital business processes, customer experiences and workflows are being relegated to the compliance toolbox.  They will satisfy regulators,

Hardware/Network

What Your Organization Needs To Know To Undergo A Secure Digital Transformation

Just about every company today is going through some type of digital transformation, whether migrating entire departments and data centers to the cloud, opting for cloud-based SaaS solutions over legacy, on-prem software,

Hardware/Network

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Hardware/Network

Can you hack me now?

How identity-based networking can protect your LTE connections from attack.With well over 200,000 cell towers up and running in the United States (and counting), the question posed by Verizon in

Hardware/Network Mobile

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

Hardware/Network

Accept the death of the traditional enterprise network: Your security may depend upon it

Today, the enterprise “network” is mobile and accessed through devices by multiple users, with a lot of the services being used served via the cloud that bypass traditional network parameters.

Cloud

5 tips for better cloud security

There’s no doubt that widespread adoption of the cloud has enabled collaboration on a much greater scale, driving innovation and creativity. Distributed workforces can work harmoniously, IT departments can offload

Hardware/Network

How internal dysfunction puts your network at risk

IDG polled 200 network and cybersecurity professionals across the U.S. & Canada, and found almost inevitable consequences for organizations where network and cybersecurity teams have conflicting objectives, are managed in

Hardware/Network

Finding the Middle Ground: Securing Smart Cities

High-profile cyberattacks and data breaches have become somewhat of a norm. You’ve likely heard this before: it’s no longer a question of if an attack will happen but when. We expect ‘always on’

Hardware/Network

One of a kind: how biometric technology is set to re-connect us with our payment cards

Biometric technology has the potential to transform the security of card payments. The way that we interact with money and purchases has undeniably changed over the past 20 years. Sadly,