9 Maggio 2017Sicurezza What it takes to be a security architect Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able […]
3 Maggio 2017Sicurezza How to protect yourself in an age of insecurity At a time where state actors have working exploits that target smart TVs and undisclosed zero-day exploits of fully patched PC and […]
1 Maggio 2017Sicurezza Report: Bad policies and practices put data at risk [Infographic] Almost every company has data stored in its systems that is overexposed and at risk. That’s the finding of the recently released […]
1 Maggio 2017Sicurezza The differences among the white, grey, and black hats The infographic below provides good, entertaining definitions of the terms white hat, grey hat and black hat hackers courtesy of Exigent Networks. […]
1 Maggio 2017Sicurezza Network monitoring tools: Features users love and hate Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need […]
26 Aprile 2017Sicurezza Report: Top 25 IT security products Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects […]
13 Aprile 2017Sicurezza How secure is your supply chain? Today’s global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering […]
12 Aprile 2017Sicurezza Face-off: Cisco vs. Fortinet for enterprise firewalls Firewalls have been on the front lines of network security for 25 years. Over time they’ve evolved beyond simple packet filtering to […]
11 Aprile 2017Sicurezza What it takes to become a chief information security officer (CISO) Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity […]
10 Aprile 2017Sicurezza Fight firewall sprawl with AlgoSec, Tufin, Skybox suites New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in […]