×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Network Security - Article Archives - Page 16

GameStop Investigating Possible Credit Card Breach

April 10, 2017 |

Credit card data from online purchases made between September 2016 and February 2017 may have been accessed.

READ MORE

Armor Raises $89M to Bolster Secure Hosting

April 07, 2017 |

Secure cloud hosting vendor formerly known as Firehost gets a capital infusion.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Ransomware Attack on Pediatric Practice Exposes 55,447 Patients' Information

April 07, 2017 |

While the company was able to avoid falling victim to the ransomware, the attackers may have been able to access patient data.

READ MORE

Scottrade Hit by Third-Party Data Breach

April 06, 2017 |

An employee at third-party vendor Genpact mistakenly left customer information exposed online.

READ MORE

NeuVector and Rancher Labs Partner on Container Security

April 05, 2017 |

The companies team up to head off the inevitable rise in security threats targeting application container environments.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

April 05, 2017 |

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BYOD Security: Understanding Bring Your Own Device Security Risks

April 05, 2017 |

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

86 Percent of SMEs Are Underfunding Cyber Security

April 05, 2017 |

And three quarters of SMEs have two or fewer IT security staff members, a recent survey found.

READ MORE

Corsa Appliance Spells a Quick End to DDoS Attacks

April 04, 2017 |

The company's NSE7000 appliance can deflect DDoS attacks under a minute with a negligible impact on network performance.

READ MORE

Managed Services: A Security Problem and Solution

April 03, 2017 |

Almost any IT function can be purchased as a service, even security. We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

20 Percent of Users Have Never Changed Their Social Media Passwords

April 03, 2017 |

And 53 percent haven't done so in more than a year, a recent survey found.

READ MORE

Nearly a Third of All Malware Qualifies as 'Zero Day'

March 31, 2017 |

An analysis of data collected from over 24,000 Firebox appliances from WatchGuard reveals the daunting security landscape businesses face today. 

READ MORE

Cyber Insurance: Insuring Your Data When Protecting It Fails

March 31, 2017 |

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

49 Percent of Organizations Don't Know if They've Experienced Insider Attacks

March 31, 2017 |

And 74 percent feel vulnerable to such attacks, a recent survey found.

READ MORE

Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities

March 30, 2017 |

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

U.S. Congress Removes ISP Privacy Rules

March 30, 2017 |

The NCTA called the repeal 'an important step toward restoring consumer privacy protections that apply consistently to all Internet companies.'

READ MORE

Radware Floats Cloud DDoS Protection Service

March 29, 2017 |

Like today's craftier attackers, Radware's new offering takes a targeted approach to blocking DDoS attacks on AWS and Azure applications.

READ MORE

Web Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Web application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE