Cloud Adoption Leaves Security Lost

Fast Pace of Cloud Adoption Leaves Security Lost in the Wind

The pace of change in technology is so fast that businesses are barely able to implement the newest solutions before they are replaced by newer and more advanced technologies. An even greater ...
Security Boulevard

2018 Summary – Data Breaches and Phishing Attacks Increase in Severity

As we get further into 2019, it’s time to look back on 2018, and ... The post 2018 Summary – Data Breaches and Phishing Attacks Increase in Severity appeared first on SlashNext ...
OpenVPN vs. IKEv2 vs. L2TP

OpenVPN vs. IKEv2 vs. L2TP: Which VPN Protocol is the Best?  

A virtual private network (VPN) provides users with privacy and secure data when they browse the internet or engage in online activity. One of the most crucial elements of a VPN is ...
Security Boulevard
SonicWall Extends SMB Cybersecurity Ambitions

SonicWall Extends SMB Cybersecurity Ambitions

SonicWall continues to diversify its approach to cybersecurity by extending the reach and scope of its software-as-a-service (SaaS) offering for securing cloud applications and expanding the number of firewalls it provides that ...
Security Boulevard
IoT Expands the Botnet Universe

IoT Expands the Botnet Universe

In 2018, we witnessed the dramatic growth of IoT devices and a corresponding increase in the number of botnets and cyberattacks. Because IoT devices are always-on, rarely monitored and generally use off-the-shelf ...
Overcoming the Shadow IT Catch-22

VMware Makes Case for Service-Defined Firewall

VMware today announced what it is positioning as the first service-defined firewall at the RSA Conference 2019. Tom Gillis, senior vice president and general manager for the networking and security business unit ...
Security Boulevard
Endpoints, Law of Entropy, Evading Chaos

Endpoints, The Law of Entropy and Evading Chaos

It is widely agreed that the universe naturally gravitates toward chaos. These same principles that govern space apply to security environments as well. Endpoint devices are not immune. They, too, are subject ...
Security Boulevard
Here’s How Carriers Can Differentiate Their 5G Offerings

Here’s How Carriers Can Differentiate Their 5G Offerings

Much of the buzz surrounding this year’s Mobile World Congress has focused on “cool” tech innovations. There are self-driving cars, IoT-enhanced bee hives, smart textiles that monitor your health, realistic human chatbots, ...
Survey Finds Security Teams Betting on Machine Learning

Survey Finds Security Teams Betting on Machine Learning

Machine learning is being tapped as a way to cut through the security data deluge A global survey conducted by Enterprise Strategy Group (ESG) of 456 cybersecurity and IT professionals on behalf ...
Security Boulevard

20 Can’t-Miss Seminars, Sessions and Panels at #RSAC this Year

| | Blog, Network Security, rsa, rsac
The RSA Conference (RSAC) will bring together nearly 700 speakers across 500 sessions; we’ve gone through every description to recommend 20 “can’t miss” sessions for 2019 ...
Loading...