• Cyber operational readiness and a complex threat landscape

    Mike Walls is the Managing Director, Security Operations and Analysis at EdgeWave. In this interview he discusses keeping pace with an increasingly complex threat landscape, cyber operational readiness, and the importance of the firewall in the modern security architecture.

  • Software-Defined Perimeter enables application-specific access control

    Back in the early 1990s enterprises migrated away from proprietary protocols such as DECnet, SNA, and Novell IPX to common standards such as IP. The motivation was the open nature of IP and access to all of the investment and innovation in and around IP. But, enterprises still wanted complete control over their network. To achieve that, the concept of IP Firewalls was introduced so that enterprises could create a unique IP network—such as internal addressing, internal routing, and internal DNS—connected to the Internet only via a firewall under their control. For the past 25 years, the term “behind the firewall” has been used as synonym for enterprise network or Intranet.

  • Real-world roadblocks to implementing CISA

    The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration.

  • Creating a secure network for the Internet of Things

    The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns (bordering on paranoia) of privacy and security professionals. Some see the Internet of Things as the promise of ubiquitous connectivity across all aspects of our life. Others view it as another in a series of uber technology trends off of which to sell new products and services. Many view the IoT movement as nothing more than marketing fluff to stir up consumer interest in new (and sometimes puzzling) networking capabilities.

  • The top 6 scariest cloud security mistakes and how to avoid them

    As Halloween approaches, the only thing more frightening than a house of horrors is a security threat to your enterprise cloud system. One slip-up could not only be detrimental to your organization, but also place your peers, clients and business partners at risk. With worldwide information security spending expected to reach $75.4 billion this year alone, IT pros have all the more reason to shape up their cloud security measures.

  • What should companies do after a wide-scale data breach?

    Following this week’s cyber-attack on the TalkTalk website, Catalin Cosoi, Chief Security Strategist at Bitdefender, offers five practical tips on what companies should do after they have fallen victim to an attack.

  • Employee activities that every security team should monitor

    As innocuous as a casual email exchange may seem, the person on the other end might actually be trying to lure employee to share credentials. And even if many work-oriented applications seem to pose no threat to IT, many apps, in fact, are infamous for collecting all kinds of data without an average user’s knowledge. Compounding these risks, IT security professionals typically have no visibility into what users are actually doing once logged in, but instead are drowning in log data that tells them just about everything else about their environments.

  • Why everyone should care about two-factor authentication

    In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives available through these devices and the ability they grant us to conduct business from anywhere, smart devices have become an omnipresent boon to our existence.

    They have also become a bit of a curse when it comes to security.

  • Internet of Things: Rethinking privacy and information sharing

    It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we live, how we move, think and act that these devices have become as natural and normal as the clothes we wear, or the idea of driving a car to work.

  • We've been hacked! Okay, I'll deal with it next week

    That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in the theft of terabytes worth of data. Actually, the exact words were “So we’ve been hacked, eh? Well, it’s Friday afternoon now so I will get my IT guy to look into it on Monday.”

Videos      Podcasts


Analytics services are tracking users via Chrome extensions

It's quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online movements are still being tracked.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Nov 24th