Network Security

Video: Privileged access in the enterprise

By

In this video, Leonid Shtilman, CEO at Viewfinity, sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

A better way to segregate data by classification level

A better way to segregate data by classification level

One of the many challenges that industry professionals face today is categorizing data within their own network. But there are ways to minimize the headaches and still ensure security.

Insider threat: The game has changed

Insider threat: The game has changed

IT security practitioners tend to focus on networked security threats, but preventing insider threats are where the real challenges lie.

RSA Conference 2012: Hacktivism forcing organizations to look inward

By

Hackvistim is not just resulting in high-profile breaches and data loss, it's also shedding light on the neglect many organizations are showing security.

In search of a global network security standard

In search of a global network security standard

A government-adopted and enforced global benchmark for network security may lend value, and borrowing from the PCI DSS playbook could help in its creation.

Sophos to acquire UTM maker Astaro

By

Sophos on Friday announced plans to acquire private network security firm Astaro for an undisclosed sum. Astaro, founded in 2000 and headquartered in Karlsruhe, Germany and Wilmington, Mass., is the world's fourth largest provider of unified threat management (UTM) solutions, Sophos said in a news release. Such technology offers multiple security functions, including network, web, mail and web application protection, through a single platform. Astaro's portfolio will bolster Sophos' existing endpoint, mobile, email, web and data protection capabilities, the company said.

Defense in depth: building a holistic security infrastructure

Defense in depth: building a holistic security infrastructure

Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.

Why we need hackers

The stigma attached to the term "hacker" needs to be dropped if computer security advancements are to be made.

Marc Maiffret appointed chief security architect at FireEye

FireEye, maker of network security solutions, has appointed Marc Maiffret as chief security architect. Maiffret formerly served as the co-founder and CTO of eEye Digital Security. At FireEye, he will be charged with leading the development of the company╒s malware protection technology, while expanding its global security research efforts. www.fireeye.com

Advertisement

How to Prevent Insider Threats!

POLL