Network Security Research
-
4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security
Sponsored by: Palo Alto NetworksBad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.
-
Iot Security For Healthcare
Sponsored by: Palo Alto NetworksLearn about an IoT Security service that allows you to prevent threats and control the risk of IoMT, IoT, and IT devices on your network across all sites.
-
SIG - How Maryland's leading healthcare provider has adopted a SASE approach to improve security and build patient trust with Cisco Umbrella
Sponsored by: Cisco UmbrellaFrederick Health needed a secure and efficient solution at the cloud edge that could provide granular controls for users no matter where they connect from. Frederick Health turned to Cisco to provide a SASE architecture and deployed DNS-layer security, secure web gateway and firewall functionality from Cisco Umbrella.
-
DNS - The Top Six Network Security Pitfalls
Sponsored by: Cisco UmbrellaTrying to get ahead by staying behind a firewall won’t work in 2021. A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common network security pitfalls that put your users, their devices, and your data at risk.
-
SIG - SASE in 15 minutes
Sponsored by: Cisco UmbrellaSecure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
-
Internal Firewalls
Sponsored by: VMwareAlthough some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
-
Learning a New Approach to Teaching in the Education Sector
Sponsored by: Shure IncEducators and students have been significantly impacted by the spread of COVID-19. While most classes are remote, hybrid learning models are also an option – either way the focus remains on providing students and teachers with a safe, socially-distant but effective curriculum. Read this article to learn more about these changes.
-
Better Together: Prisma Access And Cloudgenix SD-WAN
Sponsored by: Palo Alto NetworksIn this brief, learn how CloudGenix SD-WAN and Prisma Access have joined together to deliver hybrid applications to branch offices over any network while providing consistent, cloud-delivered security.
-
Is the SD-WAN home office here to stay?
Sponsored by: SearchNetworking.comWhile VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
-
Computer Weekly – 15 December 2020: How security will be different after Covid-19
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
-
What to include in an SD-WAN security checklist
Sponsored by: Silver PeakSD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
-
Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
-
Cybersecurity: It's a Team Sport
Sponsored by: WhiteHat SecurityDuring the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
-
Detecting and Defending Against SSRF
Sponsored by: WhiteHat SecurityServer-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
-
IT's 5 Toughest Work From Home Challenges and How to Solve Them
Sponsored by: Aruba Networks2020 has forced many organisations to shift to a hybrid work model. Although this helped employees save time on their commutes, it has led to a number of network security challenges. In this e-book, explore the 5 biggest challenges IT teams are facing and learn how Aruba can help you get ahead of them.
-
Hoe to Terminate Your MPLS Contract Early
Sponsored by: Cato NetworksIn this e-book, dive into the nitty gritty of MPLS contracts and uncover tips, steps, and an overall strategy you can use to transition from MPLS to newer, more affordable, agile WAN alternatives without break the bank.
-
TEI Spotlight Report Shows SD-WAN Customers' Results
Sponsored by: Palo Alto NetworksFor this TEI Spotlight report, Forrester Research interviewed 9 key stakeholders at different companies and surveyed a further 133 organizations with experience using Palo Alto Networks CloudGenix SD-WAN. Then, Forrester combined the results into a "composite organization" and ran a three-year financial analysis. Read the report today.
-
Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
Sponsored by: Inky TechnologyPhishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
-
Zoom & Doom: How INKY Unraveled A Credential Harvesting Phishing Scam
Sponsored by: Inky TechnologyZoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
-
CEO Impersonation
Sponsored by: Inky TechnologyThreat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
-
Around the World in 34 Phish: Covid-19 Phishing Examples
Sponsored by: Inky TechnologyThe state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
-
Exploiting a Pandemic White House COVID-19 Phishing Scams
Sponsored by: Inky TechnologyIt is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
-
Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
Sponsored by: ComputerWeekly.comIn this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
-
GoSecure Cybersecurity Perceptions Versus Reality
Sponsored by: GoSecureThis 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
-
Can a zero-trust approach fill the security perimeter void?
Sponsored by: SearchSecurity.comZero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.