4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible ...

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military? ...

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and ...

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security ...
Broadcom Symantec Carbon Black

User Experience: Achieving Performance and Security

Slow or inconsistent devices are the bane of a user’s existence. It’s understandable, as these types of experiences inhibit the user’s ability to be productive. But, a compromised user poses greater risks ...
Security Boulevard