Signs You Might Be Ready for an IDS Upgrade

When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally important today, but as threats and the ... Read More

Cybersecurity Issues Abound During the COVID-19 Pandemic

Hackers around the world are taking advantage of the rapid, widespread changes in the workforce and people’s personal online activity due to the pandemic. Widespread, mandatory work-from-home policies have led to an unprecedented volume of remote workers, which has created significant cybersecurity challenges for security teams to protect their organizations ... Read More

Cybersecurity Issues Abound During the COVID-19 Pandemic

Hackers around the world are taking advantage of the rapid, widespread changes in the workforce and people’s personal online activity due to the ... Read More

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques ... Read More

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques that are repackaged and reused (this post from security researcher Patrick Wardle has a good example of this using malware from North Korea’s Lazarus Group). On the ... Read More

Getting Network Visibility into East-West Traffic

Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations as they work to protect their networks from threats. Traditionally, ... Read More

Getting Network Visibility into East-West Traffic

Getting highly granular “everywhere” visibility continues to be a significant challenge for organizations as they work to protect their networks from threats. Traditionally, companies have prioritized monitoring and securing north-south traffic (traffic coming onto and leaving from an enterprise network to an external network such as the Internet) over east-west ... Read More

Nine Network Security Topics Grabbing Headlines in Q1 2020

The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The ... Read More

Nine Network Security Topics Grabbing Headlines in Q1 2020

The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The cost of failing to protect against these attacks has never been higher. In fact, Ponemon’s recent Data Breach Report found that the average cost of a data ... Read More

RSA 2020 Conference Recap: 7 Conference Observations from the Floor

RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s ... Read More