Top

LATEST PUBLICATIONS



Three steps you can take now for more secure mobile IoT

November 10, 2017

Category: Security, Wireless

The Cisco Visual Networking Index reports that almost half a billion (429 million) mobile devices and connections were added in 2016. Smartphones made up the bulk of this growth, followed by M2M modules. These devices, self-driving cars, mobile-connected tablets and […]


Rethink IT and security organizational structures

September 13, 2017

Via: CSO

Companies are under constant pressure to innovate in today’s fast-paced business environment. That might mean creating a better product, improving efficiency, or creating a better customer experience. Unfortunately, the security function tends to be separate from the innovation process or, […]


Will containers replace virtual machines?

September 6, 2017

Virtual machines have taken the spotlight on the telecom stage within the last few years, but the technology is by no means a one-man show. Containers, which predate virtual machines, have taken on an increasingly important role lately largely thanks […]


Analysis, Monitoring&Analysis

How to engage with the C-Suite on cyber risk management

November 15, 2017

Via: CSO

Enron changed the world of finance and the energy industry forever, and the early days of the Equifax hack look as though this breach could change the face of the credit industry and cybersecurity forever. That a single company could […]


Analysis, Monitoring&Analysis

Cultural Challenges of Network Automation

November 14, 2017

Via: Network Computing

Automating network configuration and management has many clear benefits, from simplifying and scaling repetitive, error-prone tasks to increasing the stability of networks through consistency and automatic testing. However, there can still be organizational, political, and cultural challenges to overcome. There […]


Software

The best enterprise anti-virus protection may not be enough

November 14, 2017

Via: CSO

Traditional signature-based anti-virus is notoriously bad at stopping newer threats such as zero-day malware and ransomware, but it still has a place in the enterprise, experts say, as part of a multi-layer endpoint security protection strategy. According to a survey […]