Network Security - Article Archives - Page 14

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BYOD Security: Understanding Bring Your Own Device Security Risks

April 05, 2017 |

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

86 Percent of SMEs Are Underfunding Cyber Security

April 05, 2017 |

And three quarters of SMEs have two or fewer IT security staff members, a recent survey found.

READ MORE

Corsa Appliance Spells a Quick End to DDoS Attacks

April 04, 2017 |

The company's NSE7000 appliance can deflect DDoS attacks under a minute with a negligible impact on network performance.

READ MORE

Managed Services: A Security Problem and Solution

April 03, 2017 |

Almost any IT function can be purchased as a service, even security. We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

20 Percent of Users Have Never Changed Their Social Media Passwords

April 03, 2017 |

And 53 percent haven't done so in more than a year, a recent survey found.

READ MORE

Nearly a Third of All Malware Qualifies as 'Zero Day'

March 31, 2017 |

An analysis of data collected from over 24,000 Firebox appliances from WatchGuard reveals the daunting security landscape businesses face today. 

READ MORE

Cyber Insurance: Insuring Your Data When Protecting It Fails

March 31, 2017 |

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

49 Percent of Organizations Don't Know if They've Experienced Insider Attacks

March 31, 2017 |

And 74 percent feel vulnerable to such attacks, a recent survey found.

READ MORE

Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities

March 30, 2017 |

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

U.S. Congress Removes ISP Privacy Rules

March 30, 2017 |

The NCTA called the repeal 'an important step toward restoring consumer privacy protections that apply consistently to all Internet companies.'

READ MORE

Radware Floats Cloud DDoS Protection Service

March 29, 2017 |

Like today's craftier attackers, Radware's new offering takes a targeted approach to blocking DDoS attacks on AWS and Azure applications.

READ MORE

Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

1.4 Billion Data Records Exposed in 2016

March 29, 2017 |

That's an increase of 86 percent over the previous year, according to Gemalto.

READ MORE

Cybersecurity Pros Brace for Non-Malware Attacks

March 28, 2017 |

Today's IT security experts are wary about much more than dangerous viruses and other malware, finds a new survey from Carbon Black.

READ MORE

Bay Dynamics Adds Value to Risk Fabric

March 28, 2017 |

Bay Dynamics' latest security release looks at potential losses from security risks to help IT departments set priorities.

READ MORE

Cybercriminals See 95 Percent Profit from DDoS Attacks

March 28, 2017 |

DDoS-as-a-service providers can launch attacks for as little as $7 an hour, according to a recent report.

READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017 |

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Massive Data Breach Exposes 4.8 Million Job Seekers' Personal Info

March 27, 2017 |

Names, Social Security numbers and birthdates were accessed.

READ MORE

Network Access Control: Restricting and Monitoring Access to Your Network and Data

March 24, 2017 |

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

READ MORE