System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: firewalls
10 Jul 2017 Can't Stop Cyberattacks? Teach Your Computer To Do It [64919]
Linda Currey Post, Oracle, July 10th 2017

"Corporate security teams have long built firewalls to keep the information held inside company networks safe," writes Linda Currey Post in Forbes. "But that approach carries fewer safety guarantees today, now that so many companies have embraced telecommuting and allow staffers to work on their own devices. Employees are using their smartphones and tablets to compute at home, in the local coffee shop, on airplanes, and in customer offices around the world..."
(Get More Information . .) open to premium members only

12 Jun 2017 Network Routers Can Covertly Leak Data [64303]
Homeland Security News Wire, June 12th 2017

"Researchers have demonstrated for the first time that it is possible to covertly siphon sensitive files, passwords or other critical data from any common router.

'Unlike network traffic that is heavily monitored and controlled by firewalls, this covert channel is currently not monitored,' one researcher says. 'As a result, it enables attackers to leak data while evading firewalls, air-gaps (computers not hooked up to the internet) and other data-leakage prevention methods'..."
(Get More Information . .) open to premium members only

11 Jun 2017 Yes, You Should Be Concerned About Rogue Employees (And Here's Why) [64043]
Business 2 Community, May 31st 2017

"In IT security, it's often said that a company's employees are its weakest link," writes Scott Kortright in Business 2 Community. "As technology grows increasingly user-friendly, and the rules of digital 'ownership' blur, rogue employees - those who don't follow the standard IT security rules for one reason or another - are emerging as a significant threat to corporate security.

At your organization, IT assets are likely well-protected by firewalls, network segmentation, and data security software, including email security, antivirus, antimalware, and data loss prevention (DLP) solutions. But what would happen if employees were intentionally sending valuable data off-site? What impact would this type of rogue behavior have on overall IT security?..."
(Get More Information . .) open to premium members only

31 May 2017 How To Measure Your Organization's Cyber Security Maturity [63920]
IT World Canada, May 31st 2017

"Spending money on cyber security doesn't prove an organization is getting better at it.

Ask Nicholas Johnston, Toronto-based vice president of the global data risk group at Duff & Phelps, an international consultancy.

'It is painful how many people are not doing detect and respond,' he said in an interview. 'They put in a big firewall and then not do anything else. Having logs and firewalls is great, but if nobody's looking at it, it is doing absolutely no good'..."
(Get More Information . .) open to premium members only

31 May 2017 Yes, You Should Be Concerned About Rogue Employees (And Here's Why) [63951]
Business 2 Community, May 31st 2017

"In IT security, it's often said that a company's employees are its weakest link. As technology grows increasingly user-friendly, and the rules of digital 'ownership' blur, rogue employees - those who don't follow the standard IT security rules for one reason or another - are emerging as a significant threat to corporate security.

At your organization, IT assets are likely well-protected by firewalls, network segmentation, and data security software, including email security, antivirus, antimalware, and data loss prevention (DLP) solutions. But what would happen if employees were intentionally sending valuable data off-site? What impact would this type of rogue behavior have on overall IT security?..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->