Network Security

294bb83c6b16fd49b4b29b275f319000

The Rise of Ransomware and the Consequences for SMBs

February 21, 2019 Added by:Timur Kovalev

Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Taking Advantage of Network Segmentation in 2019

January 16, 2019 Added by:Reuven Harrison

Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.

Comments  (0)

3f8fa5a4e650a6a247d80b4e3ae6b8c0

Universities Beware! The Biggest Security Threats Come from Within the Network

January 08, 2019 Added by:Victor Danevich

While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: SecurityWeek's 2018 ICS Cyber Security Conference (Oct. 22-25)

October 09, 2018 Added by:Eduard Kovacs

Hundreds of professionals from around the world will meet in Atlanta, Ga., on October 22-25, for SecurityWeek's 2018 ICS Cyber Security Conference, the largest and longest-running conference dedicated to industrial and critical infrastructure cybersecurity.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. Now Leads by Number of DDoS Botnet C&C Servers

July 25, 2018 Added by:Ionut Arghire

The United States was the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers in Q2 2018, Kaspersky Lab reports.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Intent Based Networking: Turning Intentions into Reality

July 16, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.

Comments  (0)

Dfb05b2df86265de8900aa5aadd6d685

Infrastructure Under Attack

May 31, 2018 Added by:Tom Bienkowski

Any organization that delivers services over the web needs strong, purpose-built DDoS protection.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Cybersecurity’s Dirty Little Secret

December 06, 2017 Added by:Jackson Shaw

An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Category #1 Cyberattacks: Are Critical Infrastructures Exposed?

November 07, 2017 Added by:Jalal Bouhdada

Here's why the threat of attacks against critical national infrastructures should prompt industries to address their vulnerabilities before it’s too late.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

3cf030edb83351856102235bcee85613

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Is Your “Father’s IAM” Putting You at Risk?

October 13, 2017 Added by:Jackson Shaw

Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Don’t get lost in translation when managing mixed firewall estates

June 27, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks

Comments  (0)

306708aaf995cf6a77d3083885b60907

Webinar: Top 5 Myths of ICS Cybersecurity - Debunked!

June 14, 2017 Added by:Mike Lennon

What are the top five ICS cybersecurity myths, and are they hindering you from securing your industrial process control environment? Join this webinar to learn!

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »