The sad truth is that the security practice lags behind pretty much every other IT discipline when it comes to automation. • Need to...
Hi, what are you looking for?
The sad truth is that the security practice lags behind pretty much every other IT discipline when it comes to automation. • Need to...
Recent headlines around data breaches have highlighted a common security mishap – improper network segmentation.
Most Organizations Lack the Tools and Processes to Assess and Prioritize Risks and Vulnerabilities from the Business Perspective...
Since the initial release of PCI-DSS, networks, data centers and threats to cardholder data have continued to evolve, driving further refinement of the standard....
According to a recent survey (PDF) of 240 information security professionals around the globe, network operations and applications owners to determine how security management affects organizations’...
As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter...
The DevOps movement seeks to improve the integration of development and operations teams with the ultimate goal of accelerating the delivery of critical applications....
Most large organizations are not quite ready to accept the security implications of renting unknown machines from public cloud providers, but transforming data centers...
In my previous SecurityWeek column, I wrote about Managing Security with the Business in Mind and discussed briefly the importance of taking an application-centric...
Today’s businesses must be able to rapidly adapt to changing market conditions – to support a new venture, merger/acquisition, etc. As business needs change,...
This month has been a big one in terms of new research and survey data, including AlgoSec’s State of Network Security 2013 as well...
The firewall – it’s been around since the dawn of the commercial internet, but it has been and remains a vital layer in the...
If you’re in the IT industry and haven’t been hiding under a rock for the last decade, you probably got tired of hearing the...
Next-generation firewalls go beyond filtering traffic from port 80 or 443 and deliver more control by providing the ability to filter by application type...
Increased use of applications, mobility, virtualization, and network security consolidation as well as the evolution of sophisticated threats has driven the evolution of the...
With the myriad of smartphone, tablets, applications and network security devices -- along with the growing use of virtualization and cloud services -- all...
Certainly we are no strangers to increased regulations, standards and internal policies, and the resulting audits that impact most organizations – often multiple times...
With So Many Firewalls and Rules, Most Security Administrators Have No Visibility Into What Each Application Requires...
A Network Freeze Doesn’t Mean There Aren’t Risks On Your Network That Need To Be Addressed... The holidays are officially upon us (and have...
Alexander Pope’s famous quote “To err is human; to forgive, divine” highlights the common flaw found within all of us – that we make...