Blog Posts Tagged with "Network Security"
Ending the Cloud Security Blame Game
July 08, 2020 Added by:Avishai Wool
Security is primarily your responsibility – with help from the cloud provider.
Comments (0)
Make It So: Accelerating the Enterprise with Intent-Based Network Security
June 13, 2020 Added by:Avishai Wool
How organizations can realize the benefits of intent-based networking across their hybrid networks.
Comments (0)
How Microsegmentation Helps to Keep Your Network Security Watertight
April 24, 2019 Added by:Avishai Wool
Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.
Comments (0)
Universities Beware! The Biggest Security Threats Come from Within the Network
January 08, 2019 Added by:Victor Danevich
While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions’ networks have not kept up with technology and cyber security requirements.
Comments (0)
A Siri for Network Security: How Chatbots Can Enhance Business Agility
March 19, 2018 Added by:Avishai Wool
Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring
Comments (0)
Calming the Complexity: Bringing Order to Your Network
October 20, 2017 Added by:Reuven Harrison
With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.
Comments (0)
Using Artificial Intelligence for Security Automation, Orchestration and Response
January 11, 2017 Added by:Nathan Burke
When a new threat is uncovered, an artificially intelligent system is able to apply its newly-found knowledge to all other systems in its network, launching investigations to find out whether other machines exhibit evidence of the threat or threat type.
Comments (0)
Solving the Incompatibility Problem Between Smart Network Security and Swift Operations Efficiency
November 11, 2016 Added by:Jeff Hussey
By replacing traditional IP addresses with cryptographic identities (CID), comprehensive security is enabled at the device level, rather than reinforcing a vulnerable perimeter with outdated and largely ineffective measures.
Comments (0)
Why Your Next Generation Firewall Cannot Prevent Next Generation Threats
June 15, 2016 Added by:Ajit Sancheti
Next generation firewalls had a good ten year run and are still good for the network perimeter. But when it comes to protecting the inside of the enterprise perimeter, they lack significant capabilities.
Comments (0)
Making the Most of User Entity Behavior Analytics: Expectations, Features and Best Practices
May 24, 2016 Added by:Brian Soldato
User Entity Behavior Analytics (UEBA) platforms are very promising. In the near future, expect to see user behavior analytics platforms integrate more directly with infrastructure and with automated response.
Comments (0)
Webcast: Segmentation Beyond VLANs, Subnets, and Zones
September 01, 2015 Added by:InfosecIsland News
In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
Comments (0)
The Current State of Insecurity: Strategies for Inspecting SSL Traffic
April 17, 2015 Added by:Kasey Cross
Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.
Comments (0)
The Five Things CSOs Need to Know About Software-Defined Security
January 19, 2015 Added by:Carson Sweet
Software-defined security changes the game for the CISO and their teams. Security can now move to being an enabler for enterprises that are taking advantage of the business value offered by cloud services and infrastructure, without sacrificing security or compliance.
Comments (2)
When You Are Overwhelmed With Alerts, it is Time to Automate.
January 07, 2015 Added by:Michael Leland
Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.
Comments (2)
Webcast: Detecting and Preventing Advanced Persistent Threats
July 08, 2014 Added by:InfosecIsland News
Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
Comments (0)
Encryption: The Key to Network Security
December 05, 2013 Added by:Patrick Oliver Graf
The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps