Network Access Control
Securing the Hybrid Workforce Begins with Three Crucial Steps
September 02, 2020 Added by:Rick Vanover
The global shift to a remote workforce has redefined the way organizations structure their business models.
Comments (0)
Modernizing Web Filtering for K-12 Schools
December 18, 2019 Added by:Timur Kovalev
Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.
Comments (0)
Answering Tough Questions About Network Metadata and Zeek
May 08, 2019 Added by:Kevin Sheu
As security operations teams search for the best threat data to analyze in their data lakes, network metadata often lands in the category of being just right.
Comments (0)
How Microsegmentation Helps to Keep Your Network Security Watertight
April 24, 2019 Added by:Avishai Wool
Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.
Comments (0)
Taking Advantage of Network Segmentation in 2019
January 16, 2019 Added by:Reuven Harrison
Here's how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.
Comments (0)
Universities Beware! The Biggest Security Threats Come from Within the Network
January 08, 2019 Added by:Victor Danevich
While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.
Comments (0)
Cybersecurity’s Dirty Little Secret
December 06, 2017 Added by:Jackson Shaw
An upgrade to practices and technologies to eliminate the possibility of human error or lags due to cumbersome password administration practices, will add an additional layer of assurance and individual accountability.
Comments (0)
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
November 03, 2017 Added by:Sanjay Ramnath
Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.
Comments (0)
Is Your “Father’s IAM” Putting You at Risk?
October 13, 2017 Added by:Jackson Shaw
Identity and access management (IAM) is all about ensuring that the right people have the right access to the right resources and that you can prove that all the access is right.
Comments (0)
Convenience vs. Control: Achieving the Right Security Balance
May 12, 2017 Added by:Kevin Cunningham
By embedding identity governance policy and controls throughout all IAM processes, organizations can achieve a healthy, sustainable balance between convenience and control.
Comments (0)
We Can’t Control Devices and People, but We Can Control the Network
April 26, 2017 Added by:Dennis Reilly
Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.
Comments (0)
Access Management and the Automation of Things
February 21, 2017 Added by:Dean Wiech
Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.
Comments (0)
Managing External Connectivity to and From Your Network: Do’s & Don’ts
February 07, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency
Comments (0)
The Forgotten Security Frontier: The Phone Call
January 23, 2017 Added by:Myk Konrad
The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.
Comments (0)
Automating Access May Be Best for Remote Users
September 21, 2016 Added by:Dean Wiech
When you are working remotely, things need to be very convenient, otherwise it becomes a huge aggravation of dealing with technical issues before you can get anything for work or school completed.
Comments (0)
Keep IT Safe: 5 Ways to Guard Against Olympic-Sized Streaming Threats
August 12, 2016 Added by:Peter Tsai
Big sporting events like the Olympic Games capture the hearts and attention of billions around the world. But how can companies avoid streaming agony and get high marks for network performance during live events? Here are tips straight from IT professionals.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps