Cynet Review: Simplify Security with a True Security Platform

In 1999, Bruce Schneier wrote, “Complexity is the worst enemy of security.” That was 19 years ago (!) and since then, cyber security has only become more complex.

Today, controls dramatically outnumber staff available to support them. The Bank of Am… Continue reading Cynet Review: Simplify Security with a True Security Platform

A New Paradigm For Cyber Threat Hunting

It’s no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network.

Pinpointing such th… Continue reading A New Paradigm For Cyber Threat Hunting

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipme… Continue reading Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

IPS as a Service Blocks WannaCry Spread Across the WAN

One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1.

Most enterprises defences are externally-facing, focused on stopping incom… Continue reading IPS as a Service Blocks WannaCry Spread Across the WAN

What is the hype around Firewall as a Service?

Admit it. Who would not want their firewall maintenance grunt work to go away?

For more than 20 years, companies either managed their edge firewall appliances or had service providers rack-and-stack appliances in their data centers and did it for them.

This was called a managed firewall — an appliance wrapped with a managed service, often from a carrier or managed security service provider

Continue reading What is the hype around Firewall as a Service?

Hands-On Review: Converged Networking and Security with Cato Networks

Nobody likes to do router and firewall management. It often requires a lot of hard labor just keeping the infrastructure up and running.

If you ever had to set up IPsec tunnels between different firewall brands, change a firewall rule and hope nothing breaks, upgrade to the latest software or urgently patch a vulnerability – you know what I am talking about.

All of these issues have been

Continue reading Hands-On Review: Converged Networking and Security with Cato Networks

Simplifying SSH keys and SSL Certs Management across the Enterprise using Key Manager Plus

With rapidly growing web-based services and widely expanding locations, organizations are using more and more SSL certificates as well as SSH keys than ever.

From authentication, confidentiality, and integrity to preventing the organization from indus… Continue reading Simplifying SSH keys and SSL Certs Management across the Enterprise using Key Manager Plus

Challenge! WIN $50,000 for Finding Non-traditional Ways to Detect Vulnerable IoT Devices

If you are concerned about the insecurity of Internet of Things, have good hands at programming and know how to hack smart devices, then you can grab an opportunity to earn $50,000 in prize money for discovering the non-traditional ways to secure IoT d… Continue reading Challenge! WIN $50,000 for Finding Non-traditional Ways to Detect Vulnerable IoT Devices

Facebook releases Osquery Security Tool for Windows

OSquery, an open-source framework created by Facebook that allows organizations to look for potential malware or malicious activity on their networks, was available for Mac OS X and Linux environments until today.

But now the social network has announ… Continue reading Facebook releases Osquery Security Tool for Windows