ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Nexum

  • Nexum Partners with Veteran Organization Tunnel to Towers

    Nexum’s strategy as a business is not only preoccupied with profits and growth, but also with giving back to the community. Access this blog to learn about Nexum’s new partnership with the veteran organization Tunnel to Towers, as well as how Nexum recently became a Service-Disabled Veteran-Owned Small Business (SDVOSB).

  • Black Hat 2023 and DEF CON 31: Two Conventions, One Long Week

    Security conferences present a means for professionals to learn, network, and gain new viewpoints into pressing issues. This blog presents a summary of 2 key conventions, Black Hat 2023, and DEF CON 31, comparing the similarities and differences between each. Read on to learn more.

  • Open Systems, Open Threats API Security Series Part 1

    Application programming interfaces (APIs) are the keystone to security integration as they enable communication between the various siloed solutions. In this API Security Series, Nexum review how to use these interfaces, exploit them, and prevent an organization’s name from appearing on the news. Read on to learn more.

  • DAC: Direct Attach Cable

    Even with the rise of wireless technology, cables are still a necessary component to a high-performing technology stack. As great as wireless connectivity is, there are a lot of factors that can impede performance. Because of that, devices requiring a high-speed connection would benefit from a DAC. Read on to learn more about it.

  • Visibility Matters Strategy Series

    When it comes to system visibility at the enterprise level, some organizations aren’t addressing it at all, and some deploy so many data collection tools that they confuse employees. Both situations can cause challenges, so IT leaders should be on the lookout for a solution that offers full visibility with ease-of-use. Read on to learn about one.

  • Prowler: Open-Source Tool to Secure Your Cloud Environment

    There is no doubt that the cloud has improved the way businesses can scale their technology and operations quickly and efficiently, but navigating the security landscape of the cloud can be rather difficult because of the cloud security shared responsibility model. However, there is a tool that can change that. Read on to learn more.

  • MTTD: Mean Time to Detect MTTR: Mean Time to Respond

    In cybersecurity, many different terms are used, often describing similar but unique concepts. In this installment of their acronym series, Nexum explains the difference between mean time to detect (MTTD) and mean time to respond (MTTR), exploring the similarities and differences and clarifying the easily confused terms. Read on to learn more.

  • APT: Advanced Persistent Threat

    The security landscape is filled with different complex threats, and in order to defend your organization, you need to understand what makes each unique. In this installment of their Acronym Series, experts from Nexum look at advanced persistent threats (APTs), providing a definition, as well as an overview of the concept. Read on to learn more.

  • MDR and SOC and MSSP and SIEM and EDR and XDR and SOAR, Oh My!

    In the world of cybersecurity, there is no shortage of terminology to describe the technologies that keep an organization safe. This guide will examine these terms, their meaning, and how they relate to each other. You’ll also gain best practices to help you fully leverage these technologies. Read on to learn more.

  • Training Announcement: Administering and Configuring F5 Advanced WAF

    Recent spikes in DDoS, bot-based, and other automated attacks, signal that hackers are not only targeting web-based applications. Experts at Nexum have curated a training module to help you learn to deploy and operate F5 Advanced WAF to protect web applications from the most critical security risks. Read on to learn more.

  • A Business Case for Being a Good Leader

    While there is no single cause behind the cybersecurity skills shortage, many have drawn attention to employee burnout on account of severe management practices. This article looks at the effect that abusive management strategies can have on cybersecurity burnout, and advocates for the benefits of positive leadership. Read on to discover more.

  • RFC: Request for Comments

    Do you know what “RFC” stands for? If you’re concerned with the inner workings of the internet, it’s an important term to understand. Check out this blog to learn about the acronym’s history and usage.

  • Nexum at Red Hat Summit

    Watch this video to learn about the value that automation capabilities can deliver for network engineers.

  • Work Smarter, Not Harder with Automation

    While IT has long been used in manufacturing, logistics, and critical infrastructure, IT professionals are now adopting automation, and finding success. This blog serves as an introduction to Nexium’s automation series, A curated set of articles discussing the rise of automation in IT environments. Read now to learn more about IT automation.

  • SNOCC Quarterly Threat Update

    Cybercriminals are constantly fighting to stay a move ahead, and as a result are constantly exploring new methods This blog article serves as an updated installment of Nexus’s quarterly threat updates, in which experts use their experience fighting cyberattacks to provide insight into the state of the threat landscape. Read on to learn more.

  • Let’s Play a Game (of Deception)

    What if security professionals didn’t just defend, but fought back? This blog article explores the evolving practice of deception technology, a class of cybersecurity that utilizes decoys to misdirect and lure attackers into a false objective that will notify the organization and enable further security protocols. Read on to learn more.

  • Artificial Intelligence – Savior or Skynet?

    Recently, it’s been difficult to look anywhere and not find a discussion about OpenAI’s ChatGPT, the latest example of advanced AI. This blog post explores two different vies of AI, highlighting the many potential benefits that it can contribute, while also looking at the dangers that such powerful technology entails. Read on to learn more.

  • SNOCC Quarterly Threat Update

    The threat landscape is constantly shifting, and in order to actively defend your organization you need to stay up to date on the latest attack trends. Nexum has been leveraging its experience in order to provide an overall view of the threat landscape, specifically looking at 3 key macro trends. Read on to unlock these insights.

  • DNS Privacy (DoT & DoH) & Enterprise Security

    Domain name system (DNS) privacy and security are two considerations with competing goals. This blog post looks at DNS from both perspectives, analyzing how privacy-centric protocols such as DNS over HTTP and DNS over TLS conflict with DNS-based security controls. Read on to learn more.

  • Evolved Email Security & NGFW Help Prevent Ransomware

    Ransomware continues to present the greatest danger facing security teams. This article looks at the dangers of ransomware, and how security teams can prevent ransomware by bolstering and upgrading other security systems, including secure email gateways, integrated cloud email security, and next-generation firewall (NGFW). Read on to learn more.

  • API: Application Programming Interface

    API is a commonly used acronyms in the cybersecurity space, and while many have a loose understanding of what it stands for, there is still a lack of clarity surrounding what APIs actually do. Go onto the landing page now to learn about APIs, through a succinct definition, as well as an in-depth explanation going into its origin and significance.

  • Nexum at AnsibleFest 2022 Event Recap

    With the introduction of Ansible, engineers are no longer alone in the maintenance and development of their programs, as automation can save time and energy. This article presents an overview of Nexum’s participation in AnsibleFest 2022, where vendors gathered to highlight their uses of the open-source Ansible platform. Read on to learn more.

  • Ransomware “Does Not Succeed” with DNS Ransomware Series Part 3

    Hackers have found ways to exploit networks that use DNS for initial application connection, targeting its inherent weaknesses. In this blog, Nexum discusses how Introducing DNS security controls can prevent ransomware from gaining a foothold, advocating for their offering which uses encryption to monitor your DNS. Read on to learn more.

  • The Role of Security Strategy Series

    Digital infrastructure is no longer only a tool which organizations use to execute their strategies but has itself become an essential piece of these strategies. This article introduces Nexum’s new Strategy Series, which will go further into the many ways security is influencing enterprise strategy and business initiatives. Read on to learn more.

  • TLS: Transport Layer Security Acronym Series

    You’ve probably heard of transport layer security (TLS), but with so many acronyms in the security space, you may not know what it stands for or what it really means.Access this exclusive landing page to explore expert opinions and explanations of TLS’s origin and modern importance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.