Sicurezza

How have network firewalls evolved?

Pubblicato il

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and what are the latest trends in firewall security?Initial firewall designs were simple devices that inspected each piece […]

Sicurezza

Is it time to kill the pen test? | Salted Hash Ep 22

Pubblicato il

CSO Online | Apr 17, 2018 Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping companies improve their defenses.

Sicurezza

IDG Contributor Network: Learn What NIST’s Cybersecurity Framework Can Do For You

Pubblicato il

The meteoric rise of cybercrime has caught many organizations unawares. Malware has spread from PCs to smartphones, phishing scams have grown more sophisticated, and ransomware is running rampant. You can hire hackers and botnets, or buy cybercrime software, complete with technical support, all too easily. The rapidly expanding Internet of Things is woefully insecure, creating […]

Sicurezza

IDG Contributor Network: Do you know where your data is?

Pubblicato il

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and […]

Sicurezza

Splunk’s position on SOAPA – Part 1

Pubblicato il

I’ve written a lot about ESG’s security operations and analytics platform architecture (SOAPA). SOAPA is happening because enterprise organizations are surrounding SIEM with lots of other security analytics and operations tools to accelerate incident detection and response. As this occurs, many organizations are actively integrating these technologies together with the goal of building an end-to-end, […]