Firewalls
Next Generation Firewalls are Old News in the Cloud
March 27, 2019 Added by:Sanjay Kalra
As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.
Comments (0)
The Rise of Ransomware and the Consequences for SMBs
February 21, 2019 Added by:Timur Kovalev
Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.
Comments (0)
Intent Based Networking: Turning Intentions into Reality
July 16, 2018 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder of AlgoSec, examines the potential of Intent-Based Networking and how it can improve network security.
Comments (0)
Infrastructure Under Attack
May 31, 2018 Added by:Tom Bienkowski
Any organization that delivers services over the web needs strong, purpose-built DDoS protection.
Comments (0)
Achieving Effective Application Security in a Cloud Generation
May 16, 2018 Added by:Jonathan Bregman
Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.
Comments (0)
A Siri for Network Security: How Chatbots Can Enhance Business Agility
March 19, 2018 Added by:Avishai Wool
Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring
Comments (0)
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
November 03, 2017 Added by:Jonathan Bregman
The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.
Comments (0)
Don’t get lost in translation when managing mixed firewall estates
June 27, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO at AlgoSec, looks at how organizations can ensure all of their firewalls work together consistently and cohesively across large heterogenous networks
Comments (0)
SWIFT Attacks are Evolving - Is Your Segmentation Strategy?
April 28, 2017 Added by:Jesse McKenna
As we continue to see attacks levied against banking and payment applications, the need for fine-grained visibility and control over all aspects of communication between system components will only rise.
Comments (0)
Going Global: Three Key Strategies for Managing International Firewalls
September 23, 2016 Added by:Avishai Wool
Professor Avashai Wool, CTO at Alogsec explains how businesses can best manage a cross-border firewall estate, keeping their perimeters secure globally.
Comments (0)
Keep IT Safe: 5 Ways to Guard Against Olympic-Sized Streaming Threats
August 12, 2016 Added by:Peter Tsai
Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.
Comments (0)
Back to Basics: How Simple Techniques Can Thwart Complex APT Attacks
August 11, 2016 Added by:Avishai Wool
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, discusses how organizations’ basic network structure can help or hinder APT attacks.
Comments (0)
Why Your Next Generation Firewall Cannot Prevent Next Generation Threats
June 15, 2016 Added by:Ajit Sancheti
Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.
Comments (0)
Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices
May 24, 2016 Added by:Brian Soldato
User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.
Comments (0)
Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?
April 26, 2016 Added by:Jim Legg
While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.
Comments (0)
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization