February 01, 2016
What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?
January 27, 2016
Congressional oversight committee wants to know which U.S. government agencies used firewalls that may have been affected by the recently uncovered Juniper backdoor vulnerability.
January 14, 2016
This week, a patch becomes available for Juniper firewalls, analysts parse IT employment statistics for 2015 and Aruba deploys 802.11ac for the U.S. Army.
December 23, 2015
Juniper firewalls are reportedly vulnerable to two serious backdoors, and the NSA may be at least indirectly responsible for one that exposes VPN data.
Firewalls Get Started
Bring yourself up to speed with our introductory content
Selecting a PaaS provider involves many steps. Learn the top four considerations when making this decision. Continue Reading
Image-based VM deployments can dramatically increase consistency when creating new VMs. Use these tips to configure the perfect VM on the first try. Continue Reading
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
Evaluate Firewalls Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert David Strom explains why the feature-rich Dell SonicWall NSA Series of enterprise unified threat management devices may take some getting used to. Continue Reading
Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading
Checking for configuration compliance is a time-consuming job, but administrators need to make sure virtual desktops don't drift too far away from their organization's preferred settings. Continue Reading
Learn to apply best practices and optimize your operations.
Expert Johna Till Johnson explains how the enterprise perimeter became obsolete, and how to replace network perimeter security with an approach to perimeterless security. Continue Reading
Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Continue Reading
In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning. Continue Reading
Problem Solve Firewalls Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Many businesses prefer to operate some of their workloads within an Amazon VPC. While VPC offers an additional layer of security, connectivity issues could arise. Continue Reading
Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities. Continue Reading
As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.
Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off. Continue Reading