A recent survey on mobile security confirms what most suspect. Most enterprises still have much work to do to bring mobile security up to par, especially for devices that spend most of their time connecting to data... By Network Computing Editors , 10/16/2018
If you’re working in a Security Operations Center, or aim to work in one, the CCNA Cyber Ops should be high on your list of qualifications to achieve. Few certifications cover this area.
By Alex Bennett , 10/12/2018
Be mindful of these four areas of security when considering an SD-WAN solution. By incorporating security measures like these into an SD-WAN solution, businesses gain assurance that their data, network, IT assets, and... By By Trent Pham, head of security products, Windstream Enterprise , 10/12/2018
Because the threat landscape continues to evolve rapidly, organizations are having a hard time keeping pace with the evolving cybersecurity skills required to manage their complex environments.
By By Renee Tarun, Vice President, Information Security, Fortinet , 10/05/2018
Network managers need to be open to an expanded partnership with the security group. A new EMA report finds such collaboration is already underway in many organizations.
By Shamus McGillicuddy , 9/19/2018
Application security requires collaboration between developers and security ops. Organizations need to align expectations of the two groups and shift security to the left, into the development pipeline.
By Lori MacVittie , 8/28/2018
The problems created by old hub-and-spoke network architectures are happening again with the advent of the cloud. Following these strategies can avoid building a new set of siloes.
By John Maddison, SVP of Products and Solutions, Fortinet , 8/23/2018
Organizations are beginning to invest in the infrastructure to support artificial intelligence, requiring network managers to bone up on skills including data science and security.
By Mike Leibovitz , 8/20/2018
A collaborative, peer-to-peer strategy provides several advantages over the traditional siloed approach to detecting and mitigating cyberthreats.
By Adam Wick, Research Lead, Mobile Security & Systems Software, Galois , 8/03/2018