security solution
4 DMZ Best Practices to Shield You From Attackers
In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible ...
US Ballistic Missile Agency Fails Security Audit
We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military? ...
What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?
For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and ...
Red Team 101: Understanding Kali Linux
Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security ...

User Experience: Achieving Performance and Security
Slow or inconsistent devices are the bane of a user’s existence. It’s understandable, as these types of experiences inhibit the user’s ability to be productive. But, a compromised user poses greater risks ...