The Diversifying Technology of Firewall Architecture
Previously: 2018 State of the Firewall Report A look at the overall findings in the report 94% of respondents note that firewalls are still very relevant … the problem, however, is complexity What’s...
View ArticleLinius appoints ex Telstra exec as head of channels, alliances
Australian cloud platform provider Linius Technologies has appointed former Telstra executive Stephen Pech as VP of Global Channels and Alliances. Based in Linius’ headquarters in Melbourne, Pech has...
View ArticleSecuring IoT devices: Fortinet's FortiNAC automates the process
Networks access control (NAC) has been a market in the making for almost 15 years, seeing many starts and stops along the way. Despite the promise of making it easier to automate the onboarding of...
View ArticleManish Haria Promoted to Vice President at Johnson & Quin
NILES, Ill. (BUSINESS WIRE) #directmail ― Johnson , a recognized name in full-service direct mail production and mailing services, announced the promotion of Manish Haria to Vice President of IT and...
View ArticleTake Control of Your Cloud with Gemalto at GovWare 2018!
According to Gemalto’s 2017 Breach Level Index Report , publicly reported data breaches compromised more than 2.5 billion data records as a result of 1,765 security incidents throughout the year....
View ArticleNew forecasting solution helps companies reduce cyber risk
The current feeling is that the chances of a company being hacked is a matter of when rather than if, but businesses continue to struggle with how to actually measure if their security solutions are...
View ArticleCISOs Recommend Future Actions for their Organizations
Each year, ESG conducts a research project with the Information Systems Security Association ( ISSA ) on the mindset of cybersecurity professionals (The 2017 report is available here ). As part of...
View ArticleMY TAKE: The amazing ways hackers manipulate ‘runtime’ to disguise deep...
There is a concept in computing, called runtime, that is so essential and occurs so ubiquitously that it has long been taken for granted. Now cyber criminals have begun to leverage this heretofore...
View ArticleBuilding a Cybersecurity Eco-System on a Shared Data Platform
In recent years, the number of cyber security vendors has multiplied, nearly as fast as the number of attacks. With this profusion of new tools, security practitioners are faced with complex buying and...
View Article赛博瑞森:“寓军于民”的网络安全端点保护领先企业
公司概况 以色列的网络安全行业中,自 2011 年起具有较强融资能力的初创企业不断涌现。赛博瑞森(Cybereason)则是其中一家专注于端点检测和响应软件的网络安全公司,2012 年由以色列国防部 8200 部队成员在以色列特拉维夫创立,2014 年将其总部迁至马萨诸塞州波士顿,目前在特拉维夫仍保留一家研发中心,在伦敦、特拉维夫和东京设有办事处,公司员工规模为 500人 以 内。2014...
View ArticleIDG Contributor Network: How enterprise knowledge graphs can proactively...
Traditional enterprise risk management consisted of reactive reactionary efforts to specific domains such as cyber security, fraud detection, regulatory compliance, and legal compliance. Often, the...
View ArticleGoogle now certifies rugged Android phones for business use, promises five...
Back in Feburary, Google announced the 'Android Enterprise Recommended' program . It's designed to make buying Android phones for business use easier, by only recommending models that comply with a...
View ArticlePractical application of artificial intelligence that can transform...
As I write this blog post, Im sitting by the beach on my computer in a sunny destination while my family plays in the water. Were on vacation, but we all have our own definition of fun. For me its...
View ArticleGet 'Hacking the Hacker' ($13 value) FREE for a limited time
Meet the world's top ethical hackers and explore the tools of the trade. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security....
View ArticleWhich LIFX bulb should you buy?
light your life Best LIFX Bulb for Most People We're a virtual company made up of tech experts from across the globe and work from our homes. Many of us have an affinity for smart light bulbs, and test...
View ArticleWhy Security Configuration Management (SCM) Matters
In the Godfather Part II , Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito...
View ArticleThe Vulnerability Disclosure Process: Still Broken
Despite the advent to bug bounty programs and enlightened vendors, researchers still complain of abuse, threats and lawsuits. Despite huge progress in the vulnerability disclosure process, things...
View ArticlePrivacy 101: Your Basic Questions Answered
These days, it feels like everybody’s talking about encryption and privacy. Whether you work in healthcare, energy and utilities, financial services or some other enterprise―you’ve probably come...
View ArticleFuture Tech and Practical Proactivity Will Headline ISACA’s CSX North America...
Automated Processes, Global Cybersecurity Implications Among the Highlights for Business Technology and Cyber Professionals SCHAUMBURG, Ill. (BUSINESS WIRE) Technologies that enable organizations to...
View ArticleNBN Co changes stance on unmonitored medical alarms
The NBN Co, the company rolling out Australia's national broadband network, the NBN, says it will offer additional support for unmonitored medical alarm users who get connected to the network. In a...
View Article