Your search for defense-in-depth returned 2582 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Webcast

Defense-in-Depth 2.0: Improving IT Agility and Optimizing Resources

Companies have amassed an arsenal of security tools to enable a defense-in-depth strategy. Best practices dictate the use of SIEM, VA, encryption, patching, DLP, MDM and other security tools - but this can create silos of controls and data. Given network, device, access and threat dynamics, how...

Blog Post Defense in depth: Why the Heartbleed bug is a major wake-up call

Defense in depth: Why the Heartbleed bug is a major wake-up call

Beyond a reasonable doubt is that using a defense in depth strategy makes it substantially more difficult for cyber criminals to obtain sensitive information.

Product Review MECS Server v1.9.4.2 by Mobile Active Defense

MECS Server v1.9.4.2 by Mobile Active Defense

The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices (iOS, Android).

News

Study: 3 out of 4 defense contractors changed security practices in light of Snowden leaks

A security firm highlighted the ways that U.S. defense contractors have reassessed their security programs to stave off insider threats.

Blog Post Paul Lipman, CEO, Total Defense

Paul Lipman, CEO, Total Defense

With endless amounts of talks taking place at the end of the month in San Francisco, we caught up with Paul Lipman, CEO of Total Defense, to see what's on his radar for RSA Conference 2014.

Blog Post An emerging era for cyber defense

An emerging era for cyber defense

As information technology drives automation, information security takes a percentage of that revenue away by forcing investments in securing the data on the system.

Feature Cloud: New Age defense

Cloud: New Age defense

The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.

Case Study Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Review 2013 Industry Innovators: Perimeter defense

2013 Industry Innovators: Perimeter defense

How do we protect a perimeter that does not, physically, exist?

Brief

Report: Hackers stole data from Israeli defense firms

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

News Cyber defense consortium formed to share 'fresh' malware

Cyber defense consortium formed to share 'fresh' malware

Fortinet and Palo Alto Networks expect to lure other security vendors to join and share intelligence to thwart malware at the network level.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

News Black Hat:"Saving cyberspace" requires next-level defense focus

Black Hat:"Saving cyberspace" requires next-level defense focus

Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.

Feature Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene Fredriksen

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.

Blog Post

Frequency analysis: an efficient, effective approach to network defense

Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.

Slideshow Weekend news review: June 9-13

Weekend news review: June 9-13

This week's prominent news includes the arrest of an infamous hacker, small businesses being hit by new point-of-sale malware, and a big restaurant chain launching an investigation into a possible data breach involving customer credit cards. For more deeper look at these news bits, click here to visit our...

News Skills in demand: Information security analysts

Skills in demand: Information security analysts

As global organizations work to stay ahead of cyber attacks, they require information security analysts to help steer them through risk assessment, vulnerability assessment and defense planning.

Slideshow Weekend news review: August 11-15

Weekend news review: August 11-15

For a closer look at these articles, click here to visit our news section.

Slideshow Weekend news review: September 29-October 3

Weekend news review: September 29-October 3

So far this year, more than 75 million records have been exposed in data breaches, and on the heels of that news, JPMorgan Chase announced that its breach impacted 76 million households. Plus, SUPERVALU and AB Acquisition LLC are investigating their second breach. For a closer look at these...

Slideshow Weekend news review: March 17-21

Weekend news review: March 17-21

This week's news included another retailer confirming a breach, a nasty trojan compromising thousands of Unix and Linux servers, and a new study indicating that nearly $500 billion will be spent in 2014 on recovery initiatives when dealing with data breaches and malware. For more deeper look at these...

Page 1 of 130

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US