Topic: security

What Is Domain Monitoring & Why You Need It?

Network Interview | Published on: 2022-12-21

Securing incoming and outgoing traffic while keeping track of each link that staff members click might be difficult. Hackers have recently started to pay attention to DNS since any faults could serve as a route for them to exploit vulnerabilities and carry out a domain fronting-style operation.......

What is a VPN? A secure network over the internet

Network World | Published on: 2022-12-26

VPNs date back to the 1990s when the public internet lacked almost any form of security, and the technology was developed to provide secure and cost-effective connections across this insecure landscape. VPNs have become widely deployed across enterprise networks and experienced a surge during......

Why Cyber Pros and Forensic Accountants Should Work Together to Mitigate Security Risk

Dark Reading | Published on: 2022-12-28

As global cyberattacks continue to become more sophisticated, so should corporations' risk mitigation strategies. Of these high-stakes attacks, financial motivation is the most common reason for cybercriminals to target businesses, with the IBM "Cost of a Data Breach" report finding that the......

Top Five 2022 highlights from Cisco IoT Industrial Networking

Cisco Blogs | Published on: 2022-12-22

2022 has been a year of acceleration for digitization of physical infrastructure. Industrial Internet of Things (IIoT) has helped our customers around the globe in transforming industries like manufacturing, ports, mining, transportation, utilities, and public sector. As we reflect on the last......

Palo Alto Security Profiles and Security Policies

Network Interview | Published on: 2022-12-26

Below are the key profile types provisioned in Palo Alto Firewall. Lets discus all the profile types one by one – While security policy rules enable to allow or block traffic in network, security profiles scans applications for threats, such as viruses, malware, spyware, and DDOS attacks. When......

Cybersecurity Architecture Practice Overview

CyberSecurity Memo | Published on: 2022-12-23

Security architects tailor their security approach to best fit their organization and sector, keeping in mind the risk calculations. Most plans have 3 common elements: Learning about these phases helps everyone understand on a deeper level how security architecture works and why it’s so......

Looking ahead: SASE is too messy

Light Reading | Published on: 2022-12-28

As 2022 draws to a close, it's the perfect time to start brainstorming New Year's resolutions. The telecom industry could certainly benefit from resolving to clear up confusion surrounding SASE if service providers' enterprise customers are expected to jump on board with yet another acronym with......

Will the Crypto Crash Impact Cybersecurity in 2023? Maybe.

Dark Reading | Published on: 2022-12-28

With the implosion of the FTX exchange putting a punctuation mark on the cryptocurrency crash of 2022, one of the natural questions for those in the cybersecurity world is, how will this rapid decline of cryptocurrency valuations change the cybercrime economy? Throughout the most recent crypto......

FortiGate Firewall Policy: Rules, Types & Configuration

Network Interview | Published on: 2022-12-21

Firewall policies define which traffic matches them and what FortiGate does when traffic does match, should the traffic be allowed? Initially FortiGate basis this decision on simple criteria, such as the source of the traffic then if the policy doesn’t block the traffic FortiGate begins a more......

The top 12 tech stories of 2022

Network World | Published on: 2022-12-26

The technology sector's vulnerability to the vagaries of geopolitics and the macroeconomy became clearer than ever in 2022, as IT giants laid off workers en masse, regulators cracked down on tech rule-breakers, nations negotiated data privacy, the EU-China chip war widened, and the Ukraine war......

Black Hat Europe 2022 NOC: The SOC Inside the NOC

Cisco Blogs | Published on: 2022-12-22

Our core mission in the NOC is network resilience. We also provide integrated security, visibility and automation, a SOC inside the NOC. In part one, we covered: In part two, we are going deep with security: As the needs of Black Hat evolved, so did the Cisco Secure Technologies in the NOC: The......

Palo Alto Networks SVP: Injecting zero trust into IoT device security

Light Reading | Published on: 2022-12-27

Cybersecurity threats are a huge concern for any organization, but the results of threats to healthcare facilities can result in patient data being compromised and halting vital hospital operations. Cyberattacks on healthcare organizations increased 200% from 2020 to 2021, according to a 2021......

Cybersecurity Architecture Knowledge Overview

CyberSecurity Memo | Published on: 2022-12-23

Integrity refers to whether your data is authentic, accurate, and reliable. Aka security in depth, refers to a cybersecurity approach that uses multiple layers of security for holistic protection. A layered defense helps security organizations reduce vulnerabilities, contain threats, and......

When CISOs Are Ready to Hunt

Dark Reading | Published on: 2022-12-28

Like a member of any profession, a chief information security officer (CISO) grows into their role. They exhibit a maturity curve that can be roughly split into five attitudes: You may have seen or experienced this kind of four stage evolution yourself. But there's a much rarer fifth stage that......

Best XDR Solutions

Enterprise Networking Planet | Published on: 2022-12-20

Extended detection and response platforms, also known as XDR, provide sophisticated threat intelligence and behavior-based protection, allowing enterprises to detect and respond to cyber threats quickly. Networks, endpoints, cloud services, and virtual environments are all at risk of being......