<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=152771375339675&amp;ev=PageView&amp;noscript=1">

Security on the Wire

Are Half of All U.K. Manufacturers the Victims of Cyber-Crime?

/ by Ben Haley posted in network security

0 Comments

Last week we participated at the RSA Conference in San Francisco. What an incredible conference!

Read More

What the GDPR Means for the Future of Network Security

/ by Ben Haley posted in network security, gdpr

0 Comments

Today I was looking at the agenda for RSA, this nation's biggest security conference. Not surprising, there are numerous sessions on the General Data Protection Regulation (GDPR), a sweeping act aimed at protecting private information for European Union (EU) residents.

Read More

Is Proximity-Based Security Our Last Line of (Cyber) Defense?

/ by Ben Haley posted in network security

0 Comments

2017 was a record year for many reasons. Amazing records were broken: we saw more green energy produced around the world and more capital invested in tech startups than ever before.

Read More

How to Avoid the 'Mousetrap Syndrome' of Network Security

/ by Jim Rounsville posted in network security, data limits, hop value, data breach

0 Comments

How do we protect our data?

Read More

Why Does Your Server Speak Russian? 

/ by Bill Alderson posted in network security, hop value, internet security firewall, firewall security

0 Comments

We all know how firewalls work; they prevent packets from passing through self-imposed barriers. But they don't limit how far packets go once they pass the threshold. 

The big question many U.S. organization database managers need to ask themselves is: is my server carrying high-value data to unfriendly countries? Firewalls are in place, but data is still leaking.

Is there anything else I can do to stop it?

Read More

"The Curious Case of Don Draper and the Mysterious TCP Reset"

/ by Bill Alderson posted in network security

0 Comments

It is interesting to think about what Don Draper, the famed creative director on AMC’s Mad Men (played by Jon Hamm), would do in the 21st-century if his advertising firm’s delivery of time-sensitive media were disrupted.

How would he handle cyber-crime and other critical IT failures when the advertising of his Fortune 500 clients was on the line?

Read More

[VIDEO] Everything You Always Wanted to Know About HOP Counts in Networking

/ by Bill Alderson posted in data breach

0 Comments

Even some experienced security professionals don't always know the ins and outs of hop counts in networking. Because whether you're trying to figure out the traceroute number of hops or simply want a hop count example to give you clarity, it's important, as a network security professional, you see the 10,000-foot, big-picture level, before you dig into the trenches of things like hopcount in rip and network hops command.

Read More

"It’s Not You; It’s Me": Network Protection From the Inside-Out

/ by Ben Haley posted in data limits, data breach, hop value

0 Comments

Read More

Why "Less is More" When It Comes to Network Security

/ by Ben Haley posted in network security, hop value, internet security firewall, firewall security

0 Comments

Last week, Dark Reading published an analysis of 2017’s data breaches, and the results were quite bleak. 

Read More

What the Antiquated Bank ATM Can Teach Us About Database Security

/ by Bill Alderson posted in golden goose server, data limits, firewall security, network security

1 Comment

Though the automated teller machine (ATM) may soon go the way of the eight-track and the VHS player — with automation features such as direct deposit and debit cards now available, few people use ATMs — there was a time when the ATM was the primary way most people checked their account balance and obtained cash. (Not to mention college students looking to fund their next box of macaroni and cheese.)

Read More
Privacy Policy