-
Surge in security concerns due to remote working during COVID-19 crisis (Post)
As people settle into the new way of working with many organizations working from home, it comes as no surprise that attention now turns to being productive as well as secure. In a recent survey, Bar ...
-
Ensuring Performance and Security at Cloud-Enabled Branch Offices (Post)
These days, it’s typical for branch offices to depend on a central connection that provides users with an access route to company data and apps on the network. Being tethered this way ensures secur ...
-
The 6 GHz Band: Say Goodbye to the Stone Age of Wi-Fi (Post)
Last week, FCC Chairman Ajit Pai announced a draft Report & Order to open the 6 GHz band for use by Wi-Fi and other unlicensed broadband radio systems. This new Order – which adds an additional 1 ...
-
Memory scanning leaves attackers nowhere to hide (Post)
Sophos X-Ops takes an in-depth look at memory scanning and why it matters In the first of our new series of technical thought leadership papers, which aim to give readers an in-depth look under-the-h ...
-
A year in security: what have we learned from 2019? (Post)
The cybercrime underground is not known for playing by the rules. So we can’t expect it to follow the Gregorian calendar in terms of new black hat trends. Nevertheless, the end of another 12 month ...
-
Staying Connected and Protected in a Highly Distributed World with Cisco Secure Networking (Post)
We live in an increasingly digital world where the number of connections—driven by a highly distributed and diverse web of applications, devices, and users—continues to grow exponentially.This level ...
-
SD-WAN Solutions: 5 Key Elements To Consider (Post)
SD-WAN Solution to the problemIt’s understandable why decision-makers are apprehensive about tech upgrades. While smaller businesses hold back due to upfront costs and perceived disruptions, the bigg ...
-
How Your Attack Surface is Reduced, Moving to Serverless (Post)
Serverless is a new approach to application architecture and deployment. Security becomes both easier and harder, and it is nuanced. In this post, we will go over: what got better, what got more chal ...
-
What is container technology? (Post)
Container technology, also simply known as just a container, is a method to package an application so it can be run, with its dependencies, isolated from other processes. The major public cloud com ...
-
Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced (Post)
Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the sec ...
-
Connecting from Edge to Cloud, with Dell Enterprise SONiC (Post)
Empowering customers with performance, simplified design and the flexibility of a unified NOS without vendor lock-in.SONiC, Software for Open Networking in the Cloud, an open-source network operating ...
-
Taking the First Step Toward Zero Trust with Fortinet Identity and Access Management (Post)
As more organizations move to hybrid work arrangements, a user’s identity is a more valuable commodity than ever before. Attackers are constantly looking for ways to compromise or exploit a user’s id ...