Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
Backed by its own logo, Badlock refers to a set of critical Samba vulnerabilities in Windows and most Unix/Linux operating systems, which attackers could exploit to launch man-in-the-middle attacks against corporate networks.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
In the world of the extended enterprise, everybody seeks greater visibility into network activity. But Gidi Cohen was there in 2002, founding Skybox Security to provide analytics to improve cybersecurity. Cohen discusses the evolution of visibility.
The 2016 Firewall Management Trends Report analyzes the findings of a Skybox survey of IT professionals from more than 300 enterprises and government agencies worldwide. See what tools and methods peers are using today to manage increasing network complexity and how they plan to tackle it in the future.
Improve your network security management with 4 essential best practices that enhance network visibility, security management, risk analysis, and change management processes. Network security management is a balancing act, you need the agility to expand the network to support critical services while at the same time...
With a large volume of changes cycling through the network on any given day, it's impossible to maintain security and compliance without an intelligent, standardized workflow. A closed-loop change management process will dramatically reduce associated time and costs, ensure changes won't introduce new risk and verify...
We all realize that the black hats are typically a step ahead of the white hats. But do we accept that our own security controls are contributing to the deficit? Sam Curry of Arbor Networks describes how security leaders can regain their lead in this video interview.
The volume and complexity of online attacks continue to increase, which creates a challenge for information security managers, says Darrell Burkey, director of product management for Check Point Software Technologies, in this video interview.
For years, Wade Baker was one of the main forces behind the industry's most noted data breach investigations report. Now, as vice president of strategy and analytics at ThreatConnect, he has the chance to practice the lessons he's learned, as he explains in this video interview.
DDoS attacks are on the rise, and they come across multiple vectors. In this video interview, Paul Nicholson of A10 Networks describes how organizations can defend against DDoS - and why SSL traffic inspection is a must.
Threat response is a lot like physical fitness. Enterprises know what they need to do - they often just opt not to do it. RSA's Rashmi Knowles offers advice for how to move from threat prevention to response.
Today's cyber threats are increasing in volume, diversity
and sophistication, rapidly outstripping the ability of point
security solutions to safeguard critical data, applications
and systems. Network-based security from Level 3 replaces
these vulnerable point solutions with a multi-layered approach
Point solutions are labor intensive and are simply unable to keep pace with the complexities of today's business environments and the evolving nature of threats. Proactive, network-based security eliminates that complexity and simplifies the management of your security profile.
Download this eBook to...
Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.