Firewalls

Assurance on the shore

Assurance on the shore By

While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.

Adding second-tier analysis to harness Big Data

Adding second-tier analysis to harness Big Data

The challenge that Big Data presents is trying to align disparate analytical islands. The answer comes in pulling all the pieces together.

Advancing firewalls

Advancing firewalls By

Firewalls have been an enterprise security mainstay for years. But with a majority of attacks now being launched against the web application layer of the stack, the technology must evolve.

SIEM: A mature category attracts some surprising new players

SIEM: A mature category attracts some surprising new players By

This month, we look at security information and event management (SIEM) tools.

Sony PlayStation Network back online after intrusion

By

Sony has restored its PlayStation Network (PSN), more than three weeks after service was crippled by a breach that resulted in the theft of personal information belonging to tens of millions of users.

Sony says PlayStation breach extended to other systems

By

Investigation into the breach of the Sony's PlayStation Network and Qriocity services has turned up further compromise, the company announced Monday.

Avoiding data-sharing disaster: sharing documents more risky than you think

Avoiding data-sharing disaster: sharing documents more risky than you think

CISOs need to provide safe and efficient means to establish and enforce controls over documents, facilitating collaboration with others beyond the organization.

Branch office security: What are the real problems?

Branch office security: What are the real problems?

Organizations need not overlook security at their satellite office locations, which may be lacking in on-site IT security expertise.

First things first: Refresh your firewall

First things first: Refresh your firewall

If CSOs only have budget to make one technology purchase, they should consider a firewall upgrade.

Firewall revolution or evolution?

Firewalls are again becoming talk of the town. There are an enormous amount of opinions including claims of a recent firewall revolution that have been proposed to completely change the firewall landscape. I will be the first to admit that the features and capabilities offered in today's firewall products are not the same as was offered in their original incarnation. But then again, traffic patterns and applications are not the same as they were when firewalls first hit the market.

Perimeter security: leveraging innovation to expedite convergence

Perimeter security: leveraging innovation to expedite convergence

Automation can help push forward enterprise projects, such as converging physical and IT properties.

Forrester: The good and bad of security technologies

By

A new report says web application firewalls and intrusion prevention systems are necessary technologies for many businesses, but intrusion detection systems and network behavior anomaly detection technologies are declining in popularity.

Study finds IT security pros cheat on audits

By

IT security professionals might think of auditing as a pain, but some are actually cheating to get audits passed, according to a study released Wednesday.

Website risks highlighted in two new studies

By

Two reports released this week confirmed the tidal shift in the type of websites into which cybercriminals are injecting malware.

Fatal attraction: Latest "delivery notice" trojan spews forth

By

A new torrent of spam, disguised as a message from package carrier DHL, is making its way into inboxes.

Database encryption: Top tips for protecting your company's most sensitive data

Database encryption: Top tips for protecting your company's most sensitive data

Strong security is all about reducing the attack surface available to hackers and malicious users.

Group unveils first-of-its-kind standard to secure patient data

By

An unprecedented health care common security framework seeks to raise patient trust, while enabling organizations to more effectively meet compliance mandates -- especially as they move toward electronic records.

Regulations can provide much-needed relief for security professionals

Regulations can provide much-needed relief for security professionals

When security needs are stated in terms of achieving a compliance requirement, management is far more likely to listen.

Five ways to clean your firewall of clutter and stay secure

Five ways to clean your firewall of clutter and stay secure

With the right kinds of firewall management technology in place, companies can clean their firewall rules and policies, ease the network administrator's job, boost firewall performance and eliminate security holes.

Advertisement

How to Prevent Insider Threats!

POLL