Network Security

B6749cd99f8cb495abe4ed3508a31c08

Thoughts on DoS Attack on US Electric Utility

June 04, 2019 Added by:Phil Neray

The recent DoS incident affecting power grid control systems in Utah, Wyoming and California was interesting for several reasons.

Comments  (0)

46208e1048c9421f04baab5dc8814df3

Answering Tough Questions About Network Metadata and Zeek

May 08, 2019 Added by:Kevin Sheu

As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

How Microsegmentation Helps to Keep Your Network Security Watertight

April 24, 2019 Added by:Avishai Wool

Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Next Generation Firewalls are Old News in the Cloud

March 27, 2019 Added by:Sanjay Kalra

As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

The Rise of Ransomware and the Consequences for SMBs

February 21, 2019 Added by:Timur Kovalev

Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Taking Advantage of Network Segmentation in 2019

January 16, 2019 Added by:Reuven Harrison

Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.

Comments  (0)

3f8fa5a4e650a6a247d80b4e3ae6b8c0

Universities Beware! The Biggest Security Threats Come from Within the Network

January 08, 2019 Added by:Victor Danevich

While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)

October 09, 2018 Added by:Eduard Kovacs

Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Now Leads by Number of DDoS Botnet C&C Servers

July 25, 2018 Added by:Ionut Arghire

The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Intent Based Networking: Turning Intentions into Reality

July 16, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Cybersecurity’s Dirty Little Secret

December 06, 2017 Added by:Jackson Shaw

An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Category #1 Cyberattacks: Are Critical Infrastructures Exposed?

November 07, 2017 Added by:Jalal Bouhdada

Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »