Our entire philosophy revolves around one of the most important assets of any company, DATA. We have chosen the concept CIA (Confidentiality, Integrity and Availability) and built around it a huge portfolio of products and services.

Confidentiality

Your Data is YOUR DATA! We can help you be sure that it stays your data and only the right people have access.

Integrity

Your data evolves, your data grows, keep it intact. For this purpose we can provide you with a great variety of solutions so you can make sure your data is there when you needed and as you needed.

Availability

You may have your data intact and secure, but if you cannot access, it is useless. Ask us about our solutions which can help you, give the right person, the right data at the right time.

Latest News

Boundhook, Exception Based Kernel-Controlled Usermode Hooking

BOUNDHOOK: EXCEPTION BASED, KERNEL-CONTROLLED USERMODE

Read More

Where does a WAF fit in the data path?

Web application firewalls (WAFs) are an integral compon

Read More

Breach Resilience

Join Jeff Berg, Sr. Manager of Cyber Threat Intelligenc

Read More

A Predictive “PreCrime” Approach Requires a Human Focus

In Philip K. Dick’s 1956 “The Minority Repo

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his

Read More

KRACK Attack, How Secure is Your Wi-fi Connection?

A cybersecurity researcher of KU Leuven in Belgium, Mat

Read More

Joining Forces for Cybersecurity Openness – Cisco pxGrid and McAfee OpenDXL

Interoperation of two leading security integration fram

Read More

Download the Citrix Ransomware kit

Are you reducing your attack surface so ransomware atta

Read More

MobileIron adds Apple macOS features to its enterprise mobility management tools

The Apple Release from MobileIron gives a nod to enterp

Read More

Introducing Elio

Meet Elio, NetApp’s new virtual support assistant wit

Read More

8 Months to Go – Are You Getting the Most Out of What You Already Own?

As we move closer to the May 2018 deadline for GDPR, mo

Read More

InsightOps – 2 minute overview

A two-minute overview of Rapid7 InsightOps—your moder

Read More

5 Keys to Quick and Effective Identity Verification Service Deployment

ID fraud is a critical issue for MNOs (Mobile Network O

Read More

Why We Need to Think Differently about IoT Security

Breach fatigue is a real issue today. As individual con

Read More

COBOL to the core

A COBOL Context Micro Focus has evolved to become a muc

Read More

Ransomware Attacks on MySQL and MongoDB

Ransomware is arguably one of the most vicious types o

Read More

Privileged Task Automation and Management With CyberArk

CyberArk’s Product Marketing Manager Corey O’Connor

Read More

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-i

Read More

Devising a Suitable End State of Your CTI Program

The shift to an intelligence-led security program can s

Read More

Forcepoint GDPR Product Mapping Webcast Series

In this three-part series of short, live webcasts, Forc

Read More

Simplifying Security Through Integration

(Live Webinar October 13, 2017 at 1:00pm Eastern Tim

Read More

No More Limits

Watch Josh Atwell, Developer Advocate at NetApp, explai

Read More

September’s Most Wanted Malware, Locky Shoots Back Up Global Rankings

Check Point’s latest Global Threat Index has revealed

Read More

Winning the Business Relay Race with ShareFile Secure Document Workflows

As I mentioned in my last few blog posts (links below),

Read More

Palo Alto Networks Unit 42 Vulnerability Research September and October 2017 Disclosures

As part of Unit 42’s ongoing threat research, we can

Read More

Buy one appliance and get the second one free

Modernize your enterprise VPN with the latest Pulse Sec

Read More

NCSAM, A Personal Security Crash Diet

t’s October, and that means it’s time to kick off t

Read More

SD-WAN. Oversimplified.

Technology can be extremely complex. And while software

Read More

How to Protect AWS ECS with SecureSphere WAF

Adoption of container technology is growing widely. Mor

Read More

Go with the flow! Automating and streamlining workflows with OpenDXL

Date: Wednesday, October 11, 2017 Time: 3:00PM BST |

Read More

Software Defined Storage: The Future of Storage Coming into Focus

As data becomes more diverse, more distributed, and mor

Read More

Best Practices in Release and Deployment Management

Automation is the quickest route to high performance, b

Read More

Partnering With Startups – The Road to Innovation

Until recently, established enterprises and startups ad

Read More

Rethinking Your Cybersecurity Approach, Thoughts From A CIO

October is National Cybersecurity Awareness Month, and

Read More

Breach Resilience Technology. Intelligence. Expertise

We understand the challenges and complexities that you

Read More

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-i

Read More

The Unique Challenges of Protecting Cloud Workloads

Addressing Cloud Vulnerabilities The cloud offers organ

Read More

Moving to the Cloud? Rethink your Security Efficacy

How do you protect your hybrid cloud deployments agains

Read More

Riverbed Future of Networking Global Survey 2017

Riverbed Global Survey Reveals Insights from 1,000 Busi

Read More

Maximize VMware on AWS

It’s been this binary choice for customers for far to

Read More

First, Do No Harm. Securing Healthcare IoT Devices

“When a hacker takes control of all networked medical

Read More

Ask the IoT Whiz, Defending Your Operations in the Era of IoT

This Cybersecurity Month, I’m pleased to present you

Read More

6 Dangerous Misconceptions about Network Security

When assessing or implementing network security, miscon

Read More

The Universal Translator in InsightAppSec and AppSpider

Providing better support for scanning modern web applic

Read More

Practical Tips for Personal Online Security

As a cybersecurity professional I write about enterpris

Read More

The Hack Back, A Double-Edged Sword

Global cyberattacks like Mirai, WannaCry and Petya have

Read More

NetApp AutoSupport is Evolving

Those eagle-eyed NetApp users among you may have notice

Read More

FireEye Endpoint Security (HX) 4.0 – Bringing Advanced Protection to Endpoint

A constant concern about Endpoint Protection Platforms

Read More

Building a Case for Legislating IoT Security

Earlier this summer, US lawmakers proposed a new legis

Read More

7 Cybersecurity Tactics to Watch in Government

Are you up to speed on the latest government cyber deve

Read More

Overcoming Cloud Security Challenges

Does your cloud expose you to data breaches? Protecting

Read More

Cisco Stealthwatch Cloud Free Trial

Secure your public cloud, private network, or hybrid en

Read More

Get Your Enterprise Ready for General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) is said

Read More

Bots are the Bane of Turing Security Test

Bots are cool. Bots are scary. Bots are the future. Bot

Read More

Threat Actors Target Government of Belarus Using CMSTAR Trojan

Palo Alto Networks Unit 42 has identified a series of p

Read More

macOS Keychain Security, What You Need To Know

If you follow the infosec twitterverse or have been kee

Read More

Extend Cloud Resources to the Azure-Ready Edge

Riverbed has long been optimizing application delivery

Read More

Machine Learning for Threat Detection, Hype vs. Reality

Thursday, October 5, 2017,  1:00 p.m. EDT Machine lear

Read More

The Attack on Enterprises for PII and The Need for User Behavior Analytics (UBA)

Information is the key. Information is what executives,

Read More

Building a Security Risk Management Program

The frequency of data breaches today highlights the nee

Read More

The new McAfee Is Extending Our Stride

With McAfee’s spin-off from Intel completed, our focu

Read More

How to Uncover New Savings with Infrastructure Analytics

Business-level metadata is absolutely critical for cont

Read More

Six Steps to Finding Honey in the OWASP

According to Verizon’s 2014 Data Breach Investigation

Read More

The CyberAvengers Playbook

The Non-Technical, No Nonsense Guide For Directors, Off

Read More

ForcePoint Viewpoint on Recent Data Hacks and Breaches

Updated Ed. Note: We continue to see a rash of data bre

Read More

DDL Pilot Goes Live in Maryland and Washington DC

Gemalto’s live pilot for digital driver’s licenses

Read More

The Unified Endpoint Gold Standard, Citrix Receiver, XenApp and XenDesktop

With all the buzz about unified endpoints, you can be f

Read More

Discover the Top 3 Reasons to Upgrade to a Cisco NGFW

As a Cisco customer, you expect the best in defending a

Read More

BlueBorne, A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device

The IoT cybersecurity firm, Armis, has revealed eight

Read More

Introducing CYBERARK Conjur Open Source Secrets Management Solution

“Don’t underestimate the power of your vision to ch

Read More

Multiple vulnerabilities in Wink and Insteon smart home systems

Today we are announcing four issues affecting two popul

Read More

Is APM the Missing Link in YOUR DevOps Tool Chain?

Tuesday, October 3rd, 2017 | 10:00am PT | 1:00pm ET Del

Read More

Hybrid Cloud Security, powered by XGen™

Optimized for leading environments Hybrid Cloud Securit

Read More

Consistency is Key for IoT Security

A version of the below excerpted article originally app

Read More

MobileIron Bridge, Consistent security and efficient management across all devices

Closing the EMM gap MobileIron Bridge is the first solu

Read More

McAfee Demos Ease of Exploiting Recent Apache Struts Vulnerability

A series of exploitable conditions have been uncovere

Read More

How to Deploy SecureSphere WAF on Azure

If you host apps in the cloud, then you need security i

Read More

Be Data Ready with NetApp and SAP to maximize your opportunities today – and tomorrow

Fill out the form and we’ll send you “NetApp for SA

Read More

ACI Worldwide Success Story

“The Silk tools are now instrumental to our software

Read More

Evader by Forcepoint

What is Evader? The 2017 NSS Labs NGFW Test reveals m

Read More

The Blockchain Bubble, Identifying viable opportunities for blockchain

Blockchain technology is popping up everywhere from the

Read More

The Case for Network Visibility

As a security professional and a consumer, my ears perk

Read More

Three Things about Networks That Every CIO Should Have on their Agenda

We are headed for a future in which everything will be

Read More

The Whys and Wherefores of Automating Privileged Tasks

A task can be defined as: noun 1.  A piece of work

Read More

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

It has been said – and not just by me – that encryp

Read More

FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye recently detected a malicious Microsoft Office

Read More

Optus Fusion SD-WAN – the Future of your Network, Today

I’ve worked in the industry for over 25 years, with r

Read More

PCI DSS 3.1 Compliance in the Modern Data Center & Cloud Lessons & Advice from Expert QSA Coalfire

Join Forrest McMahon from Qualified Security Assessor (

Read More

ExpensiveWall, A dangerous ‘packed’ malware on Google Play that will hit your wallet

Check Point’s mobile threat research team identified

Read More

When Walls Come Down

When you begin remodeling an older home you realize tha

Read More

Tiered Storage, How to Calculate Your Potential Margins

For cloud or managed hosting providers, storage is obvi

Read More

Protect Yourself From Antivirus

Prevent Security Breaches. Protect Your Users. Secure Y

Read More

Pulse Secure Access Solution Presented by Drawing a Whiteboard Diagram

Play Sep 12 2017 | 60 mins Graham Duthie In this webi

Read More

Rapid7 CEO, Rethink IT and Security Organizational Structures

Companies are under constant pressure to innovate in to

Read More

One year later, McAfee ESM

We have two SIEMs in the Labs and we use them slightly

Read More

Micro Focus Accelerates Deployment of Hybrid Cloud Workloads with Sensitive Data

Voltage SecureData Cloud for AWS enables consistent dat

Read More

Gartner Again Named Us a Leader in WAF

We added flexible pricing. You get the easy decision. G

Read More

Go Beyond the Limits of Airwatch

Today, many organizations still rely on a variety of to

Read More

The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products

Antivirus (AV) protection has been the foundation for e

Read More

GDPR, Why US-based Organizations Must Pay Attention, Now!

Date: Thursday, September 14, 2017 Time: 11:00 AM 

Read More

Five IoT gadgets to take on your next holiday

It’s the beginning of September, and even though you

Read More

Visibility is Essential

Vanson Bourne Report: Lack of Visibility is a Leading O

Read More

Active Threat Analytics

You’ve implemented security technology to block the m

Read More

The Usual Suspects – The Security Pitfalls of Data At Large

Data is the crown jewel of an organization – its high

Read More

Securing Your Cloud Environment, Six Critical Use Cases to Consider

Migration to the cloud continues to accelerate as organ

Read More

Maslow’s Hierarchy of Automation Needs

If there’s anything hotter than containers right now,

Read More

Apache Struts S2-052 (CVE-2017-9805). What You Need To Know

Apache Struts, Again? What’s Going On? Yesterday’s

Read More

SD-WAN. Oversimplified.

Technology can be extremely complex. And while software

Read More

Edith Wharton, Identity Theft, and the GDPR

During one of my talks for Gartner, I asked the audienc

Read More

Layered Protection Is a Must. Here’s Why.

Cyber attacks are advancing in their sophistication. Ta

Read More

Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code

Many attacks on mobile devices use social engineering t

Read More

What Do Best-of-Breed Security Products and Top NFL Draft Picks Have in Common?

Analyzed individually, they can’t predict success.

Read More

The Wait Is Over – SnapCenter 3.0 Is Here

How can you jumpstart protecting your SAP HANA database

Read More

Lives Are on the Line with IoMT in Healthcare

A patient lies on his bed. A furrow of concern crosses

Read More

All Killer, No Filler, How Metadata Became a Security Superpower at Gigamon

Gigamon on Gigamon: Learn how we leverage the power of

Read More

Identity Fraud Is Everywhere, Here’s How to Improve Market Fraud Scoring Systems

A particular type of fraud has emerged in various count

Read More

Blockchain Versus the GDPR

The EU’s General Data Protection Regulation (GDPR)

Read More

Discovering a Session Hijacking Vulnerability in GitLab

GitLab is a widely used SaaS provider that focuses on d

Read More

Retail Network Security Trends and Threats Report

In this webcast Michael Osterman will share the results

Read More

Tomorrow’s Endpoint Protection Platforms

Why common endpoint security can’t beat modern threat

Read More

How Do You Spell Credential Theft Protection…EPP, NGAV, OR EPM?

It’s 2017 and time to realize that cyber attackers ha

Read More

Forget the kids. We need this for IT Automation.

Our youngest is nine (AND A HALF! DON’T FORGET THE HA

Read More

JavaScript Lost in the Dictionary

Check Point threat Intelligence sensors have picked up

Read More

Network Defense, Powered by XGen™ security

Comprehensive security The threat landscape continues t

Read More

Overcoming IT barriers to digital transformation

The end user experience is essential to a successful di

Read More

Cloud Security Attack – Fancy Hare

IT Security Leaders know their network and endpoints in

Read More

EUC Decoder Ring for the HCI Buyer

In this post, I’m going to talk about the evolution o

Read More

Palo Alto Networks Meets With Pentagon and International Officials

Last week Palo Alto Networks had the honor of meeting w

Read More

4 Ways vADC Can Transform Your Business

Chances are, your company has a hybrid IT environment c

Read More

Gone Phishing, A Case Study on Conducting Internal Phishing Campaigns

To many, emails are boring. It’s been a long time sin

Read More

Data Protection and the GDPR Job Market

The May 2018 deadline for full GDPR compliance will b

Read More

Law v. Technology

A great number of the cases that make it to the United

Read More

Android Click-Fraud Apps Briefly Return to Google Play

Click-fraud apps frequently appear on Google Play and t

Read More

What’s New with MobileIron EMM

We are excited to bring you another new release of Mob

Read More

Cloud Chaos, the Identity and Access Control Conundrum

As you deliver more cloud-based applications, managing

Read More

People Are the New Security Perimeter – Introducing ForcePoint UEBA

I’ve written recently about how cybersecurity has t

Read More

FireEye Summer Demo Series August 15 – September 28

Innovative FireEye technologies continue to set the sta

Read More

Why Pervasive Visibility is So Important

Please join us as Gigamon CMO, Kim DeCarlis, walks you

Read More

The Network. Intuitive. Explained.

Introducing an entirely new era of networking. Constant

Read More

SandBlast Mobile Teams With Microsoft Intune

Cyberattacks have evolved beyond the enterprise perime

Read More

The Unified Endpoint Gold Standard: Citrix Receiver, XenApp and XenDesktop

With all the buzz about unified endpoints, you can be f

Read More

2017 Gartner Market Guide for Privileged Access Management

The 2017 Gartner Market Guide for Privileged Access Man

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader!

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

NetApp Vision for NVMe over Fabrics and Storage-Class Memory

Flash is powering the digital transformation. New emerg

Read More

Riverbed Improves ‘Digital Experience Management’ with Latest SteelCentral Update

Companies of all kinds continuing to invest heavily in

Read More

OSX.Pwnet.A – CS, GO Hack and Sneaky Miner

We recently found a hack for Counter-Strike: Global Of

Read More

The Key to Encryption. Simple for Government Leaders; Difficult for Attackers

Over the last few decades, the U.S. government created

Read More

Challenges of Big Data Security

Database security best practices are also applicable f

Read More

Why Human-Machine Teaming Will Lead to Better Security Outcomes

Artificial intelligence and machine learning have never

Read More

Streamline daily workflows to drive business

Move beyond inefficient, paper-based processes with mob

Read More

F5 on AWS: How MailControl Improved their Application Visibility and Security

Organizations like MailControl often discover they need

Read More

Comparing the Push for Anti-Encryption and Cyber Sovereignty

An unintended consequence of the push for government ac

Read More

Forcepoint A Leader in Gartner 2017 Magic Quadrant for Enterprise DLP Nine Consecutive Times

Gartner has once again positioned Forcepoint as a leade

Read More

No More Network Blind Spots: See Um, Secure Um

East Coast summer nights of my childhood were thick wit

Read More

CyberArk & ForeScout Secured, Enables an In-Depth Credential-Protected Discovery Process

Learn how the CyberArk-ForeScout CounterACT™ integrat

Read More

Cisco 2017 Midyear Cybersecurity Report

Discover the latest cybersecurity vulnerabilities and s

Read More

Preparing for the Workspace of the Future

Future work environments will no longer tether employee

Read More

Measuring the Usefulness of Multiple Models

The past several years have seen a massive increase in

Read More

Are Your Apps Chasing Users Away?

How to Deliver Superior Digital Experiences Users expec

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader!

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

Frost & Sullivan Define How Pulse Secure is Differentiated in the NAC Global Market

Larger technological developments have made NAC solutio

Read More

Addressing Data Across Borders for the GDPR

Most enterprises today do business across the globe, ha

Read More

Mastering the Endpoint, A Forrester Report

Organizations now monitor 10 different security agents

Read More

Mobile Document Management with Docs@Work

Content is the lifeblood of the enterprise. Today compa

Read More

How to Perform Continuous ONTAP Upgrades Without Sacrificing IT Stability

Don’t be surprised if you see the NetApp IT storage t

Read More

Kevin Mandia, CEO of FireEye, Speaks at DoDIIS17 About Cybersecurity

Kevin Mandia, CEO of FireEye, talks about Russia, China

Read More

Notes From DODIIS 2017: Talking Cyber Espionage and Insider Threat

Read on for a sneak peek into some of the Insider Threa

Read More

Quantum Computing? Really?

We just had an interesting discussion here about quantu

Read More

Cisco and IBM collaborate to increase security effectiveness

On May 30, 2017, Cisco and IBM Security announced a ke

Read More

The growing U.S. IT productivity gap

Productivity growth has slowed down despite our rising

Read More

Locking Down the Remote Vendor Attack Pathway Through Privileged Account Security

Remote vendors are everywhere, and they’re not limi

Read More

F5 on AWS: How MailControl Improved their Application Visibility and Security

Organizations like MailControl often discover they need

Read More

Interested in SD-WAN?

Watch this video with SiliconANGLE to learn how to desi

Read More

How to Build Your Endpoint Security Blueprint

Date and time: August 23rd, 2017 at 10am PT | 1pm ET S

Read More

To Upgrade or Not to Upgrade Your Hardware, that Is the Question

When you think of security, you probably think “softw

Read More

Are You Prepared for the Next Attack?

A WAKE-UP CALL From WannaCry and Petya to the most rece

Read More

Network Security in the Amazon Web Services Cloud – It’s Your Responsibility!

There is a presiding notion that because established cl

Read More

Back Up Your SaaS Data with NetApp Cloud Control for Microsoft Office 365

Unless something goes really wrong, IT rarely makes hea

Read More

Preventing Cybercrime Through Collaboration and Information Sharing

Cybercrime is not something that any one entity can tac

Read More

Securing the Digital Dream

Secure SD-WAN opens the door to digital transformation

Read More

Under Armour on Top of Network Security

Real, hands-on experience always supersedes any marketi

Read More

Still Using Stateful Tokens? There is a Better Way!

Lately, with regards to tokenization, we’ve been seei

Read More

A Leader for Four Consecutive Years in the Gartner Magic Quadrant for WAFs

Gartner has published their 2017 Magic Quadrant for Web

Read More

Balance Speed & Agility With Security & Compliance

Developers are shifting to a DevOps delivery model to i

Read More

Citrix Positioned as a Leader in IDC MarketScape Report

What being a leader means and why it matters to custome

Read More

The Hunt for IoT, The Rise of ThingBots

The Internet of Things (IoT) and, specifically, the hun

Read More

The CISO’s Most Effective Weapon, Threat Intelligence

Today’s most successful CISOs embrace cyber threat in

Read More

Re-Thinking the Cyber Consolidation Paradigm

The Battle of Consolidation vs. Best-of-Breed, does mor

Read More

SentinelOne Demo

Want Zero-Day protection? Watch this video & see ho

Read More

BakerRisk Provides a Deep Dive Into Risk Management Engineering

Baker Engineering and Risk Consultants, Inc. (BakerRisk

Read More

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

In our previous blog posts about AMP and Threat Grid on

Read More

MobileIron customers are all-in on Apple for business transformation

In Apple’s Q2 earnings call, Luca Maestri stated that

Read More

Three Simple Questions You Should Ask Every Flash Vendor About NVMe

In the coming years, every major storage vendor will be

Read More

Risk Remediation is Easy with Aperture

Learn more about SaaS security:

Read More

A new vADC chapter is written

A new chapter for a visionary disruptor: Today, the vAD

Read More

Everyone Needs Better Network Visibility

I just returned from a busy week in Las Vegas attending

Read More

Has storage and server encryption kept pace with modern IT to adequately reduce risk?

Storage and server vendors seem to be stuck with the hi

Read More

Challenges of Big Data Security – Whiteboard Wednesday [Video]

Database security best practices are also applicable f

Read More

New Surveillance Malware “FruitFly” Is a Nearly Undetectable Mac Backdoor

Mac malware outbreaks used to be viewed as a rarity. Ho

Read More

Get a Competitive Edge with Digital Workspaces — Oxford Survey Result

A recent survey by Oxford Economics reveals a satisfy

Read More

Privileged Access Management, A Matrix Approach for Account Ranking and Prioritization

Throughout the course of my six years in helping KPMG

Read More

F5 CTO Ryan Kearny and SVP Calvin Rowland discuss cloud trends at F5Agility17

F5 Chief Technology Officer Ryan Kearny shares insights

Read More

GDPR – The Final Countdown

With under a year to go until the regulation becomes en

Read More

Riverbed and Xirrus—Raising the Bar for Mobile Application Performance

The April 2017 merger of Riverbed and Xirrus brought

Read More

Measuring the Usefulness of Multiple Models

The past several years have seen a massive increase in

Read More

Cyber Attacks Can Be Prevented

Based on the latest news headlines —from WannaCry to

Read More

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

When business leaders think about the Internet of Thing

Read More

Clustering and Dimensionality Reduction: Understanding the “Magic” Behind Machine Learning

These days we hear about machine learning and artificia

Read More

Threats are changing. Your SOC should, too.

Analytics-driven. Human+machine teaming. The next evolu

Read More

MobileIron Continues Track Record of Security Innovation with 55th Patent

MobileIron, the security backbone for the multi-cloud

Read More

How the Next-Generation Security Platform Contributes to GDPR Compliance

The General Data Protection Regulation is the European

Read More

On-demand Webcast: Next Generation Cyber Security

In this short webcast, Gigamon CTO, Shehzad Merchant, p

Read More

Forcepoint Simplifies Cybersecurity Through Cloud-Based Behavior Analytics

New Forcepoint CASB behavior analytics help enterprise

Read More

Encryption for Data-at-Rest Leveraging OASIS KMIP

As a universally-accepted best practice, there is no su

Read More

Tackle and Simplify IT – Adopt a Secure Digital Workspace

As a member of the Cloud Services team at Citrix, I hea

Read More

The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services

Today’s highly motivated cyber attackers continually

Read More

Are Your Apps Stressing Out Users with Poor Performance?

A recent survey finds 27% of users claim poor performan

Read More

Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science

Many attackers continue to leverage PowerShell as a par

Read More

Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

Latest SteelCentral release closes the visibility gap b

Read More

Introducing Check Point SandBlast Mobile for Microsoft Intune

If your enterprise is using Microsoft EMS and is lookin

Read More

The Weather Report: Seamless Campaign, LuminosityLink RAT, and OG-Miner!

In our first ever Cisco Umbrella Security Weather Repor

Read More

Disrupting the Disruptors, Art or Science?

Security professionals are in a fight every day to trac

Read More

App Wrapping and Containerization by AppConnect

MobileIron AppConnect containerizes apps to protect cor

Read More

10 Good Reasons to Upgrade to ONTAP 9.2

NetApp® ONTAP® 9.2 was released in May 2017 and went

Read More

Conversations on Securing Microservices, API Gateways and Containers

Last month, I met James (name changed) while at AWS Su

Read More

Format-Preserving Encryption Summer Reading

Hello again, format-preserving encryption enthusiasts a

Read More

Perspectives on the New Defender Lifecycle Model, A Q&A with Gigamon CTO Shehzad Merchant

In his blog “Moving Toward a Security Immune System,

Read More

Forcepoint Cloud Security Reaches “FEDRAMP IN PROCESS” Phase

In a cloud-first world, advances in technology constant

Read More

Circumventing Application Whitelisting and Misplaced Trust

Application whitelisting has been an advantageous techn

Read More

Auto Retailer Drives Growth with Citrix Cloud

Clint Newell Auto Group was at a crossroads. Existing I

Read More

In EternalPetya’s Wake, How Could Regulators Punish Victims?

The EternalPetya (aka NotPetya, NonPetya, ExPetr) vir

Read More

SentinelOne Virtual Appliance, Cloud When You Want It, On-premises When You Need It

We are pleased to announce the immediate availability o

Read More

SD-WAN vs. MPLS

Keeping up with traditional management approaches for w

Read More

Cloudy Forecast, Are you Naked in the Cloud?

What do high-clearance government employees, telecommun

Read More

Cisco Cybersecurity Report, Exploit Kits Down, Email Malware Up

Cisco released its 2017 mid-year cybersecurity report

Read More

Up and to the Right, NetApp Moves Up in 2017 Gartner Magic Quadrant for Solid State Arrays

Gartner recently released its July 2017 Magic Quadrant

Read More

Finding the Value of ‘Intangibles’ in Business

We modeled the Cybersecurity Canon after the Baseball

Read More

Secure Access Solutions for Mobile, Cloud and Internet of Things – Latest Release

Embrace the latest cloud, mobile and IoT technologies w

Read More

New GDPR-Focused Media Hub Launched By IDG/CIO and Hewlett Packard Enterprise

Do you have questions regarding the pending enforcement

Read More

Uncover Sensitive Data with the Classifier Tool

Understanding what sensitive data resides in your enter

Read More

McAfee June Threats Report

Malware evasion techniques and trends Malware developer

Read More

NSS Labs NGFW Test: Is your firewall a top performer?

NSS Labs leads the industry in third-party assessments

Read More

Rethink Your Access Strategy, Think BeyondCorp

Years ago, Forrester declared dead the old security ma

Read More

Cloud Security Use Cases – A Panel Discussion

July 25 / 2PM EST Insights via use cases and lessons le

Read More

A Closer Look at SentinelOne

Date and time: July 20th, 2017 at 10am PT | 1pm ET Spe

Read More

Comparing Four End User Experience Monitoring Methods

Truth be told, the lines between End User Experience M

Read More

Database Updates, Backup/Restore and Collecting Troubleshoot with Firepower Device Manager

This video walks through the process of updating the va

Read More

FlexPod Survival Guide, The Start of an IT Revolution

Do you know the Beatles song “Revolution”? The lyri

Read More

Top Insider Threat Concern? Careless Users

It’s been a busy year thus far in the cybercrime worl

Read More

Palo Alto Networks Now a Six-Time Gartner Magic Quadrant Leader

Gartner’s 2017 Magic Quadrant for Enterprise Network

Read More

Prevent Threats of IoT from Sneaking Past Your IT Team

The Evolution of IoT Business and consumer industries h

Read More

The Power of an Integrated UEBA/SIEM Solution

If you’ve read our previous blog, “Leveraging UEBA

Read More

See What Matters

Gigamon, the industry’s #1 network Visibility Platfor

Read More

New York Life Transforms Insurance with MobileIron and Skycure

Our agents have secure mobile access to the right infor

Read More

Streamlining Your Data-Security Program to Meet Regulatory Change

Mark Bower, Global Director of Product Management, HPE

Read More

Secured Credential Scans: When Vulnerability Management is Powered by Privilege

In order to attain comprehensive, enhanced results, vul

Read More

F5 on AWS, How MailControl Improved their Application Visibility and Security

Organizations like MailControl often discover they need

Read More

Complying with Data Protection Law in a Changing World (SANS)

INDUSTRY ANALYST REPORT For many enterprises, the legal

Read More

Are you Ready to Respond?

“In our current state of cyber security, security bre

Read More

BROKERS IN THE SHADOWS – Part 2, Analyzing Petya’s DoublePulsarV2.0 Backdoor

In the wake of WannaCry, a new cyber threat has emerged

Read More

Comparing Four End User Experience Monitoring Methods

Truth be told, the lines between End User Experience M

Read More

What your MDR does when threats like Nyetya hit

When your Security Operations team is finishing the day

Read More

The Secret Citrix Sysadmins

Embedded deep within the Engineering group at Citrix, t

Read More

MobileIron Core 9.4 – The Top 5 Things to Know

MobileIron Core 9.4 introduces powerful new features ai

Read More

How Traps Protects Against Astrum

Astrum is a relatively old exploit kit (EK) that is als

Read More

Pulse Policy Secure: NAC Product Overview and Insight

Pulse Secure LLC is a provider of secure access and mob

Read More

The day a mysterious cyber-attack crippled Ukraine

This online attack brought chaos to Ukraine’s banks,

Read More

Neutralizing Data Breach and Insider Threat

Governments and enterprises are more challenged than ev

Read More

Are All Ransom Attacks Considered Ransomware?

Ransomware has loomed large in the news of late. It s

Read More

Defending against the latest Petya variants

60 minute pre-recorded webinar on-demand. New variation

Read More

Employees Behaving Badly: The Everyday Insider Threat

If you’ve ever worked in an office, you know that you

Read More

Stop the IoT attack that comes before THE ATTACK

Generally speaking, the use of the term “attack” ha

Read More

Are You Ready to Respond? Evaluate and Improve Your Ability to Respond to the Next Attack

“In our current state of cyber security, security bre

Read More

Radicati 2017 Corporate Web Security Market Quadrant

ANALYST REPORT: Forcepoint is a leader in Corporate We

Read More

Put a stop to enterprise ransomware

While most enterprises are still recovering from WannaC

Read More

Riverbed at Mobile World Congress 2017

Riverbed was at the Mobile World Congress (MWC) 2017 to

Read More

Securing the Cloud, Ward Off Future Storms

A recent incident has left the voting records of 198 mi

Read More

Start Your Privacy Protection Planning Now

One of the most talked about topics at the June Infosec

Read More

Tips for Gamifying Your Cybersecurity Education and Awareness Programs

Employees are fast becoming the weakest link in the def

Read More

WWDC Looking for the Enterprise ‘Easter Eggs’

Courtesy of WWDC 2017 Apple has been very clear about i

Read More

Security for Amazon Web Services (AWS)

Advanced Security for Amazon Web Services Moving infras

Read More

Challenges of Insider Threat Detection – Whiteboard Wednesday [Video]

Insider threat detection and containment of insider thr

Read More

Private Clouds Demand a Different Mindset

The cloud changes nothing. The cloud changes everything

Read More

Targeted Attackers Lead the Way in Evasion Techniques

Throughout 2017 we have observed a marked increase in t

Read More

Top 7 Reasons You Need a Security Delivery Platform

In terms of technological innovation, we live in intere

Read More

Four pillars of payments security, one solution: Welcome to the age of AKB

The retail market relies on payments security, yet encr

Read More

vSEC for your AWS Workloads

Utilizing the same security management tool across your

Read More

Nyetya. Global Ransomware Attack. What you want to know.

Hear from Martin Lee, technical lead on Cisco’s Talo

Read More

Steps to Protect Your Organization from Ransomware

How Citrix solutions keep malicious attacks out of your

Read More

CyberArk Labs: Ransomware

Ransomware is a type of malware designed to infect mach

Read More

Best Practice Security Policy Concepts and Methods for Your Data Center

A data center houses an enterprise’s most critical da

Read More

The Cloud: A Growing Driver for SD-WAN

Software-defined wide area networking (SD-WAN) has beco

Read More

Don’t Let Hackers Hold Your Enterprise Ransom

While most enterprises are still recovering from WannaC

Read More

Petya/NotPetya Ransomware: What you need to know

Our SentinelOne research team is actively monitoring th

Read More

Cryptography for Mere Mortals #15

An occasional feature, Cryptography for Mere Mortals at

Read More

How to Protect Against Petya Ransomware in a McAfee Environment

A new variant of the ransomware Petya (also called Petr

Read More

Detect Suspicious File Access with Dynamic Peer Groups

In a previous post, we shared three primary reasons w

Read More

Doddle Increases Speed of Rollout with Appurity and MobileIron Cloud

MobileIron and Appurity make it easy to improve the eff

Read More

AWS Public Sector Summit Attendees Want Better Visibility into Cloud Traffic

From June 12-14, Gigamon exhibited at the AWS Public S

Read More

Petya Ransomware Spreading Via EternalBlue Exploit

On June 27, 2017, multiple organizations – many in Eu

Read More

Forcepoint Statement on June 27 Worldwide Ransomware Attack – Petya

Forcepoint Security Labs is aware of a new variant of t

Read More

Russian Hackers, Face to Face

The news is full of stories about Russian hacking and s

Read More

Cisco Extends Security Openness with McAfee Interoperability and New Technology Partners

Vendor “openness” drives better outcomes for the st

Read More

WannaCry: Why Citrix Customers Are Not Crying Today

What is WannaCry? On Friday, 12 May 2017, one of the la

Read More

5 Ways to Address the General Data Protection Regulation (GDPR) With CyberArk

On May 25, 2018, the General Data Protection Regulation

Read More

How Should We Think About Securing Critical Infrastructure?

In the first part of the afternoon panel discussion, Ge

Read More

Decline in Rig Exploit Kit

Starting in April 2017, we saw a significant decrease i

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his

Read More

Free appliance upgrades with the Pulse Access Suite

The Pulse Secure Advance Now promotion combines the hig

Read More

How a Hacking Group Used Britney Spears’ Instagram to Operate a Command and Control Server

A nasty piece of malware is currently being tested by

Read More

Pushing Incapsula SIEM Logs Directly to an Amazon S3 Bucket

Incapsula allows you to push your account’s SIEM log

Read More

Deliver cloud-based enterprise mobility management (EMM) at scale

Empower employees to work faster and smarter with secur

Read More

FlexPod SF: A Scale-Out Converged System for the Next-Generation Data Center

Welcome to the age of scale-out converged systems—mad

Read More

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

In this article, we’ll present a new hooking techniqu

Read More

Resolve security incidents quickly, efficiently and at scale

Your business is your top priority. At best, attacks ar

Read More

Key Message from Palo Alto Networks Ignite 2017: We Need to Work Better Together

Last week, I had a security choice to make: Go to the G

Read More

ICIT Calls for Legislation to Enforce Encryption on Government Agencies

The starting point for a new study from the Institute

Read More

SteelCentral Release Assures Your Digital Transformation Initiative

According to IDC, the percentage of enterprises creatin

Read More

How Cisco Engineers Used Machine Learning to Solve an Impossible Problem

In 2015 Rich West, a systems architect with Cisco’s i

Read More

Tips to Optimize Performance of your Digital Workspace

Who doesn’t like to run a system in tip-top shape? An

Read More

Building Trust in a Cloudy Sky

The state of cloud adoption and security This report, b

Read More

MNOs Want Better Security: Achieving Threat Prevention in a Hyper-Connected 5G Environment

Only a few years ago, the world was buzzing with the te

Read More

Setting and Enforcing Policies with Pulse Secure Access Suites

A demonstration of how to control which users are able

Read More

Trends in Cloud Apps APIs, Integration, Microservices & DevOps

CLOUD-CON: Integration & APIs features top experts

Read More

Complying with Data Protection Law in a Changing World

Failure to meet legal and political expectations for da

Read More

Gartner Security and Risk Management Summit, All Roads Lead to…Visibility!

This week in National Harbor, MD, Gartner held its annu

Read More

DDoS Attacks Can Lead to Large Outages

The focus of the news media has been on massive DDoS at

Read More

How Patent Quality Influences the U.S. Economy & Tech Industry

Recently the director of the U.S. Patent and Trademark

Read More

Privileged Account Security Inside Industrial Control Systems(ICS)

Date and time: Tuesday, June 20, 2017 1:00 pm Eastern D

Read More

IDaaS, Everything but the Directory Sync

Back in 2011, Marc Andreesen famously declared that

Read More

Five Reasons Your Digital Experience Management Strategy Could Fail

You can be sure your CEO has digital experience on his

Read More

Armory Sandbox – Building a USB analyzer with USB armory

The USB armory is a small computer on a USB stick, prov

Read More

Anatomy of the Jaff Ransomware Campaign

Last month, Check Point researchers were able to spot t

Read More

Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

“Did you get my email? The really urgent one? About f

Read More

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework

At Palo Alto Networks, we strive to provide the most co

Read More

Secure Access Solutions for Mobile, Cloud, and Internet of Things

[WEBINAR] Tuesday, April 11, 2017 | 8:00-9:00am PST / 1

Read More

Pay-As-You-Go Data Management for Your Data Center

The flexibility to pay for only the resources consumed

Read More

Evolution of the EMM Industry

Gartner just published the 2017 Magic Quadrant for Ente

Read More

Can I Trust My Vendor’s Security Claims? Peer-reviewed vs. self-certification methods

Format-preserving encryption (FPE) is in the news recen

Read More

Pervasive Visibility Extended to AWS GovCloud (US)

In April, Gigamon announced our quick progression in ac

Read More

Cybersecurity: For Defenders, It’s about Time

In multiple areas of cybersecurity, time works in favor

Read More

Behind the CARBANAK Backdoor

In this blog, we will take a closer look at the powerfu

Read More

Shadow Admins – The Stealthy Accounts That You Should Fear The Mos

Shadow Admin accounts are accounts in your network that

Read More

Good Enough is only Good Enough Until It Isn’t

Let’s talk turkey. Or crème eggs. Or boxes of candy.

Read More

Check Point Defeats Mobile Cyberattacks

Advanced cybercrimes aren’t science fiction; they’r

Read More

Why Firepower Threat Defense

Demo Friday: Why Firepower Threat Defense? (Live Webina

Read More

Welcome to the Future of Work

We are living in a rapidly changing world. Broad adopti

Read More

Networking for the Cloud Era

Simplified Cloud Connectivity with SD-WAN Join Microsof

Read More

Moving to the cloud…Now what?

A cloud-first strategy begins an elaborate and sometime

Read More

Market Guide for Data Masking

Published: 6 February 2017 Analyst(s): Marc-Antoine Meu

Read More

Why the Traditional Approach to File Security is Broken

In today’s knowledge-driven economy, modern enterpris

Read More

Cybersecurity: For Defenders, It’s about Time

In multiple areas of cybersecurity, time works in favor

Read More

Securing Mobile Access for the Government with the MobileIron PIV-D Entrust App

Presented by: Sean Frazier, Chief Technical Evangelist

Read More

Cloud Month on DevCentral

The term ‘Cloud’ as in Cloud Computing has been aro

Read More

SMB Exploited: WannaCry Use of “EternalBlue”

Server Message Block (SMB) is the transport protocol us

Read More

The Visibility Platform: See What Matters

Webinar Title: The Visibility Platform: See What Matter

Read More

The Case for Comprehensive Access Management

The insider threat does not necessarily cease when an e

Read More

What the General Data Protection Regulation (GDPR) Means for You

The GDPR is upon us! Well, almost… If your organizati

Read More

Cisco Accelerates Digital Transformation with Enterprise Agreement Launch

This is exciting. It has been just over a year since my

Read More

FIREBALL – The Chinese Malware of 250 Million Computers Infected

Check Point Threat Intelligence and research teams rece

Read More

Evaluating Security Solutions Across the Kill Cyber Chain

The Cyber Kill Chain is an intelligence-led, trademarke

Read More

The End of “Pure-Play” SD-WAN. Market Consolidation Begins.

Cisco has announced its intent to acquire Viptela, Inc.

Read More

Traps Advanced Endpoint Protection Technology Overview

Most organizations deploy a number of security products

Read More

NetApp acquires two companies to boost cloud storage

NetApp has unveiled two acquisitions it expects to help

Read More

Join HPE Security at the Gartner Security & Risk Management Summit

June is right around the corner, which means it is time

Read More

Expanding Automated Threat Hunting and Response with Open DXL

Today everyone is talking about security automation. Ho

Read More

Forget uptime. A low MTTR is the new ‘5 9s’ for IT

Outages are expensive. Whether they’re ultimately the

Read More

Watch FireEye Endpoint Security Detect and Prevent a WannaCry Attack

Since May 12, 2017, a highly prolific WannaCry ransomwa

Read More

Safely Embracing the Cloud – Forcepoint CASB Overview

In order to understand your organization’s risks and

Read More

Who Owns Cybersecurity Risk Management?

In light of the countless cyber incidents reported dail

Read More

Securing the Connected Car Steps Up a Gear

“Here in my car, I feel safest of all …” That lin

Read More

Cybersecurity Threat Landscape Has Grown Exponentially

Cyber crooks are now casting a wider net, attacking not

Read More

What Makes an Expert in the Age of AI

Author and journalist Malcolm Gladwell fields audience

Read More

A Balanced Approach to Securing Unix Environments

Unix environments present unique challenges to IT secur

Read More

Optimized for Next Generations’ Secure Access – Pulse Connect Secure 8.3

Pulse Secure introduced the Secure Access Suite and w

Read More

SteelHead SD is the full HD WAN optimisation platform

There was a time when you went to buy a new TV you woul

Read More

WannaCry: Whodunit?

That’s the, er, $61,614.02 question! The worldwide Wa

Read More

The Great Divide: Bridging the Cloud with On-Prem Systems

The information landscape now spreads to the farthest c

Read More

Meeting SOC 2 Type II Compliance with Incapsula

We are pleased to announce that Imperva has released an

Read More

Become a Modern Endpoint Security Master

A new wave of advanced, targeted malware is seeking out

Read More

Forcepoint Cloud Security Delivers Value and Protection Against Today’s Cyber Attacks

Forcepoint announced the availability of a host of new

Read More

CyberArk Discovery & Audit

In this 30 second video, learn why you should scan your

Read More

Now that HTTPS is almost everywhere, what about IPv6?

Let’s Encrypt launched April 12, 2016 with the intent

Read More

How to Avoid Being the Next Victim of Ransomware

Ransomware is one of the most prevalent and feared form

Read More

Citrix and Microsoft: A Year of Achievement … and We’re Just Getting Started

One year ago at Citrix Synergy, Citrix and Microsoft ki

Read More

AMPlify your Security

See how our customers are enhancing their security post

Read More

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector wh

Read More

NSS Labs Webinar: Is your endpoint security worth it?

Date and time: June 8, 2017 at 11am GMT Speakers:  Mi

Read More

WannaCrypt just killed your weekend…

We have grown accustomed to computer viruses but the la

Read More

What Is Your Hyperconverged Infrastructure Strategy?

One of the best parts of my job is the constant convers

Read More

Everything You Always Wanted to Know About SD-WAN Architecture (But Were Afraid to Ask)

Woody Allen directed and starred in a film with a simil

Read More

WNCRY ransomware demonstrates dangers of homogeneous, unpatched networks

Whenever history seemed to repeat itself, my Granny use

Read More

New Ransomware Adjusts Its Price Based Off Where You Live

Discovered on Exploit, a Russian hacking forum, a new k

Read More

Top 5 GDPR Myths: Get the Facts

The General Data Protection Regulation (GDPR) has been

Read More

Data Masking Addresses the Changing Threat and Compliance Landscape

HPE Security – Data Security is pleased to be recogni

Read More

F5 Application Connector, Connecting and Controlling Cloud Apps

Applications are moving to public clouds. Maybe not as

Read More

How Intelligence Enriches Security Consulting Services

Join Jeff Berg, Sr. Manager of Cyber Threat Intelligenc

Read More

WannaCry Post-Outbreak Analysis

Many of the technical aspects of the WannaCry ransomwor

Read More

What is normal? Organizations use machine learning to ferret out data anomalies

Over time, technology can automatically raise red flag

Read More

WanaCrypt0r aka WannaCry ransomware wreaks havoc worldwide

The WanaCrypt0r ransomware hit with a vengeance on Fri

Read More

Global Ransomware Attack “WannaCry” Still Infecting Organizations in 150+ countries

Ransomware cyber attacks are quickly becoming the prefe

Read More

Now What? Moving Forward After the WannaCry Attack

Deep Breath. WannaCry surged into headlines fast – gr

Read More

Securing Assets and Applications in the Cloud

In our recent blog, Cloud Security: Who is Responsible

Read More

NetApp Showcases Cloud-Connected Data Management Solutions at VeeamON 2017

NetApp, a VeeamON 2017 premier sponsor, will showcase a

Read More

Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks

What Happened On Friday, May 12, 2017, a series of broa

Read More

SyferLock joins Pulse Secure’s Technology Partner Program

SyferLock Technology announced that it has joined Pulse

Read More

Dynamic Application Profiling: What It Is and Why You Want Your WAF to Have It

Because web applications are unique, they have distinct

Read More

Beyond the Red and Blue Pill – Maintaining Data Usability while Protected

Many of us remember, or have at least have seen the mem

Read More

Further Analysis of WannaCry Ransomware

McAfee Labs has closely monitored the activity around t

Read More

Mobile for work is the next Industrial Revolution

Tech and mainstream news is full of headlines about how

Read More

The Hunt for IoT

How in the world do Death Star-sized botnets come about

Read More

Make Your Cyber Risk Escalation Framework a Stairway to (Security) Heaven

Security is a board-level issue. While the high media f

Read More

WannaCry Ransomware-Worm Targets Unpatched Systems

Yesterday, the world saw one of the most significant ma

Read More

WannaCry: What We Know So Far . . .

An unprecedented cyber-attack by a ransomware variant k

Read More

CyberArk acquires Conjur

Built for Security. Designed for Agility. Now available

Read More

It’s not if. It’s when.

How do you best defend against attacks that get stronge

Read More

Get Ready to Rumble!

Citrix enjoys giving back to communities through our S

Read More

DiamondFox modular malware – a one-stop shop

Check Point researchers have conducted a thorough inves

Read More

Active IQ: monitoring / reporting

Real-time system visibility The SolidFire Active IQ Saa

Read More

Announcing ‘Built for Mobility’ release from Pulse Secure

Pulse Secure just released updates to its Pulse Workspa

Read More

Salsa is to Chips as Riverbed is to AWS

One of my favorite sayings with some of my favorite peo

Read More

Journey to customers: HPE SECURE DATA’S INNOVATION, APPLICATION & SOLUTION

When discussing the focus for data security at Hewlett

Read More

Database Activity Monitoring: A Do’s and Don’ts Checklist for DBAs

In a previous post, we looked at the limitations of nat

Read More

Mastering Endpoint Security

DATE: Wednesday, May 10, 2017 TIME: 11:00AM PDT | 1:00P

Read More

How the World Bank is mobilizing their workforce with Android

Since formally launching enterprise support in Android

Read More

The role of AI in cyber security

Hyper-connected workplaces and the growth of cloud and

Read More

Dridex and Locky Return Via PDF Attachments in Latest Campaigns

Dridex and Locky, two prolific malware families that ma

Read More

Why Networks Matter to App Architecture

A lot of articles have been written on the topic of th

Read More

CyberArk Secures Digital Transformation in the Cloud

New Cloud Automation Capabilities Enable Organizations

Read More

Securing the Future with Artificial Intelligence

Artificial intelligence and the Internet of Things are

Read More

Cisco Security Integrated Solutions

Check out the new Security Operations Center in Cisco E

Read More

Ransomware– Not Only File Encryption

Ransomware is an ever-increasing threat worldwide, clai

Read More

Redefine the Future of Networking

Riverbed has announced a definitive agreement to acq

Read More

Limitations of Artificial Intelligence

At SentinelOne, we often tout machine learning and beha

Read More

Data Categorization or Data Classification?

In the last few years there has been a dramatic shift f

Read More

Chico State Speeds Student Access to Resources with NetApp

IT staff improves operational efficiency so students ge

Read More

Q&A: James Plouffe, lead solutions architect at MobileIron

Just how much do security breaches really cost? Nick Bo

Read More

Introducing the New Traps v4.0: Advancing Endpoint Security – Again!

Today, we’re pleased to announce the release of Traps

Read More

HOLY GUACAMOLE! – Chipotle Hit With Data Breach

Chipotle Mexican Grill Inc. has had a rough couple of y

Read More

This Tricky Phishing Scam Manages to Impersonate Legitimate URLS

This past week, a new web-based phishing scam has emerg

Read More

Why Care About Data-Centric Security?

It’s no surprise that data breaches are evolving and

Read More

End-to-end Protection for Payment Data

In today’s environment of heightened regulatory requi

Read More

Visibility as Foundation for a New Security Model

Defining a “Security 1.0” model is not difficult: I

Read More

Where We’re Headed Now. Charting the Path for a Faster, Smarter, and Safer IoT

The main theme of this year’s Mobile World Congress (

Read More

Smarter Endpoint Security: How to go Beyond Prevention

Today’s endpoint security products do what they were

Read More

Safely Embracing the Cloud – Forcepoint CASB Overview

Thu, May 18, 2017 11:00 AM – 11:30 AM EDT In orde

Read More

Linux Security: Securing SSH Keys and other Privileged Credentials in the Cloud

According to AWS over 70% of the VMs provisioned are so

Read More

OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic

People often assume that if you’re running OSX, you

Read More

SentinelOne Enterprise Risk Index

SentinelOne’s new Enterprise Risk Index (ERI) provide

Read More

Respecting Customer Privacy is Not an Option

There was recent news of a multi-billion dollar start-u

Read More

Apps are On the Move, What’s a CIO to Do?

People have been on the move for a while — workspaces

Read More

The Next Generation Data Center Demands a Next Generation Storage Architectur

In today’s digital economy, markets and customer purc

Read More

8 Ways Governments Can Improve Their Cybersecurity

It’s hard to find a major cyberattack over the last f

Read More

Cloud Networks Made Simple with Riverbed on AWS

AWS makes it simple to set up cloud-based resources. Bu

Read More

Solving Bigger Problems for Government: Q&A with Carahsoft

Gigamon prides itself on partnering with the best—and

Read More

Protecting Sensitive Data In and Beyond the Data Lake

The need to secure sensitive data in Hadoop and IoT eco

Read More

Are You Getting Buried by the Endpoint Security Snowball Effect?

It starts out innocently enough: there’s a dangerous

Read More

MobileIron and Microsoft Strategy

This three-part blog series is my perspective on Micros

Read More

7 Practices that Make Your Organization Vulnerable to Cyber Attacks

Today I read “How you can be the smartest cybersecuri

Read More

6 steps to prepare your architecture for the cloud

Face it: most IT architectures are complicated. And if

Read More

Securing Finance: Lessons Learnt So Far

In 2016 FireEye observed an increase in the number of a

Read More

Gartner: Critical Capabilities for Enterprise Data Loss Prevention 2017

Forcepoint Received Highest Product Score For Regulator

Read More

The Successful CISO: Tips for Paving the Way to Job Security

Seasoned CISOs know that failure to plan past a two-yea

Read More

CHECK POINT INFINITY

Check Point Infinity is the first consolidated security

Read More

The Cisco 2017 Annual Cybersecurity Report

This report identifies the major trends impacting cyber

Read More

Redefining the ADC: Managing hybrid/multi-cloud application delivery

Learn how Citrix is redefining the ADC to manage applic

Read More

Cybersecurity Attacks Hit 87% of Organizations in 2016

A recent report found the majority of IT professionals

Read More

3 Ways to Speed Office 365 Adoption – Webinar

Thursday, May 4th, 2017 | 11am PT | 2pm ET Get on track

Read More

Endpoint Protection for SCADA and ICS Environments? Traps Has Your Back

Information technology (IT) administrators have been qu

Read More

Preventing Ransomware Attacks Becomes Vital in Healthcare

The deluge of ransomware attacks in 2016 on hospitals a

Read More

Why I Advocate for NetApp

Last year, I was invited to join the EMEA Chapter of th

Read More

McAfee Goes Back to the Future

I want to address a change that began six months ago an

Read More

Think Beyond 365 Office

Securing Office 365 on mobile devices is essential to t

Read More

GDPR Compliance and Its Impact on Security and Data Protection Programs

It’s almost impossible to ignore the buzz around the

Read More

FireEye Helix

Today’s security operations are frequently disjointed

Read More

Growing Momentum on the Public Cloud with AWS

Gigamon launched the Visibility Platform for AWS a few

Read More

HPE Secures FIPS Validation for Format-Preserving Encryption

Hewlett Packard Enterprise reached a major milestone th

Read More

New Wave of Ransomware Could Put Utilities at Risk

The stakes for protecting against ransomware are about

Read More

Demanding a Plan for Cyber Resilience in the IoT

Earlier this month, I wrote about the need for a holist

Read More

NetScaler and Kubernetes: An Enabler for Digital and DevOps Teams

In 2016, we sowed the seeds of putting a Citrix NetScal

Read More

F5 Private Cloud Solution Package for OpenStack

App Services in Red Hat OSP Cloud Deployed in Days Toda

Read More

Unknown Malware Continues to Rise

Last year, unknown malware downloads rose over 900% wit

Read More

Ready, Aim, Protect With Total Endpoint Protection

Tuesday, April 18th, 2017 at 3:00 PM EDT (19:00:00 UTC)

Read More

3 Ways to Speed Office 365 Adoption – Webinar

Thursday, May 4th, 2017 | 11am PT | 2pm ET Get on track

Read More

Visibility-Enhanced. Deployment-Streamlined.

A key element of the Advanced and Enterprise Edition of

Read More

Palo Alto Networks Welcomes LightCyber to the Team

In February 2017, Palo Alto Networks acquired LightCybe

Read More

neteffect Offers Hybrid Cloud Disaster Recovery Solutions with NetApp

NetApp converged infrastructure gives neteffect technol

Read More

What’s In a Name?

In one of the most iconic self-help books of all time,

Read More

2017 Cyberthreat Defense Report

Register now to download CyberEdge’s fourth-annua

Read More

IoT Driving the Need for More Secure Big Data Analytics

IoT Summit 2017 Keynote – Reiner Kappenberger, HP

Read More

SSO for your Hybrid Cloud

In our recently released State of Application Delivery

Read More

What About the Plant Floor?

Six Subversive Security Concerns for Industrial Environ

Read More

Off-The-Shelf Ransomware Used to Target the Healthcare Sector

In the past year, the Healthcare sector was one of the

Read More

Did You Know That Gigamon Can Help with Online Fraud Detection?

As many of you are aware, online fraud is on the rise,

Read More

Citrix NetScaler @Synergy 2017: Bigger & Better Than Ever

Showcasing our latest innovations to help you reliably

Read More

CyberArk Expands C3 Alliance to Drive Greater Cyber Security Innovation and Collaboration

New Integrations with Atos, Phantom, Proofpoint and RSA

Read More

Don’t take risks with your network

We’ve got it all covered. Network covered. Branch cov

Read More

The latest findings on Chrysaor (Pegasus for Android) are even more stealthy

Earlier this week Google published a research about a n

Read More

NY Cybersecurity Regulation Targets Financial Services, but Implications are Much Wide

The web of security and privacy regulations continues t

Read More

Ewind – Adware in Applications’ Clothing

Since mid-2016 we have observed multiple new samples of

Read More

Securing the organisation against the fines of the GDPR

In just over a year, the new European General Data Prot

Read More

SentinelOne Endpoint Protection Platform Overview

Watch this short introduction to learn the mechanics of

Read More

The Radicati Market Quadrant for Advanced Persistent Threat (APT) Protection 2017

INDUSTRY ANALYST REPORT THE RADICATI GROUP: FORCEPOINT

Read More

Defense in Shallow: Four Reasons Attackers Slip Past Conventional Security Deployments

Many security vendors offer what they call “defense-i

Read More

McAfee is Back – And Ready to Lead

Today we introduce a ‘new’ McAfee to the world. It

Read More

WS DDoS Mitigation: Challenges, Best Practices and Tips

With Amazon Web Services accounting for more than one t

Read More

Backup to the Cloud For Dummies

Get this easy-to-use guide to learn how to efficiently

Read More

The Blockbuster Sequel

Unit 42 has identified malware with recent compilation

Read More

GDPR – be prepared, be response-ready

As any business unfortunate enough to have suffered a d

Read More

SteelHead SD – A Quick Demonstration

Riverbed SteelHead SD combines the power of industry-le

Read More

How to Talk Cyber Risk with Executives

On March 7th, 2017, a bipartisan bill was introduced to

Read More

Who is Responsible for What

Today, the benefits of cloud computing are very well es

Read More

Introducing XenApp Essentials Citrix

Citrix XenDesktop Essentials Service accelerates Window

Read More

Stopping Your Staff from Raining Data from the Cloud

No matter what your company’s official position is on

Read More

Securing Assets and Applications in the Cloud

In our recent blog, Cloud Security: Who is Responsible

Read More

Beyond NonStop Encryption

In the world of NonStop, we may take for granted as tru

Read More

Welcome to the New McAfee

  Today is the first day of new McAfee, and the fi

Read More

Example architectures for data security and the GDPR

The European Union (EU) General Data Protection Regulat

Read More

SteelHead CX Completes Common Criteria Certification

It’s been close to a year, but we finally did it! Riv

Read More

Reactive Isn’t Working

This video featuring Dr. Stephenson, Technology Editor,

Read More

FireEye & Belden: Protecting ICS with Enterprise and Industrial Security

Industrial Control Systems are increasingly open to att

Read More

SWIFT Security Concerns Resurface

The Bangladesh Bank heist has resurfaced as reports aro

Read More

Instant Desktop Computing, From the New Samsung Galaxy S8 Smartphone

Today, at Galaxy UNPACKED 2017 at Lincoln Center in New

Read More

Effective Security for Today’s Threats

Security that’s effective, automated and integrated.

Read More

From DDoS to Server Ransomware: APACHE STRUTS 2 – CVE-2017-5638 Campaign

A common infection vector used by botnet creators is sc

Read More

Demo of WhatsApp Web Account Takeover

A vulnerability has been discovered in WhatsApp Web. Th

Read More

Secure Access Solutions for Mobile, Cloud, and Internet of Things

Tuesday, April 11, 2017 | 8:00-9:00am PST / 11:00-12:00

Read More

Wanna be a game changer?—Networking Mantras for the 21st Century

Managing networks can mind-numbingly complex. Does it h

Read More

Best practices for securing, analyzing, and mitigating threats to your AWS applications

Companies are increasingly moving applications to Amazo

Read More

Harness the Full Potential of the Hybrid Cloud

Transform your Hybrid Cloud vision into reality. Learn

Read More

6 Things Every CIO Should Know About iOS 10.3

Last year at the end of March, Apple released important

Read More

Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Cybercriminals have long had the advantage, continually

Read More

Payment Compliance Does not Always Equal Security

Payment data breaches still make big headlines. I have

Read More

Your Tools Deserve a Solid Foundation

One of the most important steps in designing and deplo

Read More

What SaaS teaches us about automating network infrastructure

The success of SaaS is largely due to companies being a

Read More

Hunting Privileged Account Vulnerabilities with CyberArk Discovery & Audit (DNA)

It’s widely understood that cyber intruders and inter

Read More

Securely access business apps and data with BYOD

A bring your own device (BYOD) program can lower costs

Read More

Senate Votes to Allow ISPs to Legally Sell Your Browsing History Without Permission

In what the LA Times called a “norrow vote,” the Se

Read More

Online Denial of Service Attacks Are a Growing Concern

Last year, millions of Australians were unable to fill

Read More

CyberEdge 2017 Cyberthreat Defense Report

Sponsored in part by HPE Security – Data Security Reg

Read More

What Are You Sacrificing to Protect Your Endpoints?

Pop quiz: What’s the right balance between user flexi

Read More

Check Point discusses securing web servers with multi-layered security at Google Next 2017

Check Point security expert Erez Berkner discusses secu

Read More

Looking Beyond AV: Solving the Endpoint Protection Problem

There has been a noticeable decline in the effectivenes

Read More

Imperva FlexProtect Simplifies Security for Hybrid Cloud Application Deployments

FlexProtect, SIEM dashboard and scalable WAF deployment

Read More

GHD Customer Testimonial for Riverbed SteelConnect

When global professional services company GHD merged wi

Read More

What Biosecurity and Cybersecurity Research Have in Common

Biosecurity and cybersecurity research share an unusual

Read More

Is Your Security Team Ready For Cloud?

By now, most of us in IT are well aware of the technica

Read More

Wirestorm Success Story: Automated DevOps and Cost Reduction Across Multiple Clouds

“When I look at a platform that allows me to do an en

Read More