IT Security

Best Practices For Incident Response In The Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify

7 Database Security Best Practices

Databases – by definition – contain data, and data such as credit card information is valuable to criminals. That means

CrowdStrike Evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions

Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*.

5 Steps For Securing The IoT Using Aruba ClearPass

Historically the Internet of Things (IoT) has been much more hype than substance. Sure, there have been a few verticals

Masergy adds advanced WAN encryption service to its network app store

Managed Service Provides Powerful End-To-End Security for Data “In Flight” Over Public or Private Networks Dallas – June 27, 2016 – Masergy Communications

The 10 Most Common Mobile Security Problems and How You Can Fight Them

When it comes to security, most mobile devices are a target waiting to be attacked. That’s pretty much the conclusion

7 Best Practices For Fixed Asset Inventory Software

Small businesses that don’t utilize fixed asset inventory software often encounter the pitfalls that can doom startups and companies with

LogRhythm Adds New Layer To Its SIEM 2.0 Big Data Security Analytics Platform

BOULDER, Colo.–October 16, 2012–LogRhythm, the leader in cyber threat defense, detection and response, today announced the enhancement of its award-winning

Security Analytics will be the Next Big Thing in IT Security

Most enterprises have enough security technology in place to protect their businesses. They also have plenty of data from SIEMS

The Practice of Network Security Monitoring, Review: A Hands-on Guidebook

A firewall will no longer protect your company network: you have to cope with users needing to take documents out,

Bricata’s 100 Gbps NGIPS Sets New Performance Standard

Bricata LLC, the pioneer of performance intrusion prevention security systems, announced today that the company’s ProAccel LX100 NGIPS appliance successfully

Check Point Recognized as a Leader for Vision and Execution in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls

SAN CARLOS, CA, May 31, 2016 (Marketwired via COMTEX) — SAN CARLOS, CA–(Marketwired – May 31, 2016) – Check Point®

Managed Security Services: MainOne Partners Radware for Robust DDOS Mitigation

MainOne, the premier connectivity and data centre solutions company in West Africa, and Radware® (NASDAQ: RDWR), a leading provider of

When it comes to wireless networks, security can’t be an afterthought

The Internet of Things, bring-your-own-device (BYOD) office environments, and cloud-based applications are contributing to rapid changes in how organisations deploy

Mobile Application Management versus Mobile Device Management System

Mobile Application Management and Mobile Device Management System are all a part of Enterprise Mobility Management. However, many miss on

Sophos Unveils Malware Removal Tool Which Cleans Exploit Code

Sophos, a global leader in network and endpoint security, today launched Sophos Clean, the latest addition to its Enduser protection