Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach compromise incidents occur within minutes, with 11 percent of those occurring within seconds. Read why it is important to monitor your […]

How to build a better SOC team

Read Reggie Best explain how companies can build a better security operations team on Help Net Security : The security skills shortage is a very real issue. Cisco estimates that there are currently one million unfilled cyber security jobs worldwide, while a report from Frost & Sullivan predicts that by 2020, the number will be […]

Five ways to empower your staff while keeping your network secure

Read Pascal Bergeot list five ways in which companies can empower their staff and yet keep network secure on IT Pro Portal : News broke this month of a sophisticated new email phishing scam based on Google Docs. While Google claims to have stopped the attack in its tracks, it once more shows the dangers […]

Extreme Makeover: AI & Network Cybersecurity

Read Derek Manky article about how artificial intelligence can help network cyber security on Dark Reading : Security strategies need to undergo a radical evolution. Tomorrow’s security devices will need to see and interoperate with each other to recognize changes in the networked environment, anticipate new risks and automatically update and enforce policies. Read his full […]

Businesses (still) struggling to prevent network breaches

Businesses are still struggling to prevent network breaches and keep themselves safe from cyber-attacks. This is according to a new report from Netskope, the quarterly Cloud Report. Read more about the new report by Netskope which reveals that businesses are still struggling to prevent network breaches on IT Pro Portal.

Real words or buzzwords?: Network-friendly

Read Ray Bernard’s article about network friendly on Security Info Watch : The term network-friendly started popping up in the physical security industry around 2003, and was in use in the IT domain earlier than that, in recognition of the fact that some applications and systems performed better over a network than others, and some […]

Incident Response: How to Prepare for Attacks and Breaches

Read  Cynthia Harvey’s article about how organisations can prepare for attacks and breaches on eSecurity Planet : If a hacker breached your network today, what would you do? What if a company employee unwittingly infected your systems with ransomware? What if attackers defaced your website or launched a distributed denial of service (DDoS) attack? What […]

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Read why Sue Marquette Poremba says that using right network access control can add a new level of cyber security to organisations on eSecurity Planet : The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to fight through each line of defense to break into the network and gain access […]

Securing Today’s ‘Elastic Attack Surface’

Read Amit Yoran’s article about network security and today’s ‘elastic attack surface’ on Dark Reading : Security pros today feel overwhelmed by the current cyberthreat environment and the deluge of security solutions on the market. Given the rapid adoption of cloud, BYOD, IoT and DevOps, many lack confidence in their ability to accurately assess exposure […]

Network Security Policy

A security policy designates an organization’s security controls, without specifying technologies, as well as offers high-level directives on acceptable and unacceptable actions to protect critical assets. A policy should also be applied throughout the organization in a consistent manner and provide a reference for employees to operate their typical activities. Read the analytical article about […]