cybersecurity | Page 9


Recent cyber attacks on the NHS and other healthcare systems have brought potential ramifications into the limelight. Read this post to find out more. [Read More]
by RSS Claire Silcock  |  Mar 10, 2017  |  Filed in: Industry Trends
How do government agencies protect their networks and data from cyber attacks in the face of the growing cyber skills shortage? Integration and automation are the keys. [Read More]
by RSS Katrina Fox  |  Mar 05, 2017  |  Filed in: Industry Trends
Read this post to find out why your employees might just be today’s biggest threat to healthcare data security. [Read More]
by RSS Susan Biddle  |  Dec 14, 2016  |  Filed in: Industry Trends
Internal opportunities for information sharing might seem obvious, but are easily overlooked. Information sharing is essential if we want to get ahead of the escalating cyberthreats today’s organizations are facing. We are just beginning to learn that we can no longer afford to build network security solutions based on isolated devices that cannot share threat intelligence or coordinate a response. As networks becomes more complex and distributed, the ability to consistently secure a workload as it moves across the network from an endpoint... [Read More]
by RSS Ken McAlpine  |  Dec 13, 2016  |  Filed in: Industry Trends
Look at any M&A due diligence checklist and you’ll see the same things: financials, customer information, sales, real estate, intellectual property, contracts—and the list goes on. One thing you may not see is information security, and that can be a crucial mistake. Like any other critical component of running a business, security needs to be right at the top of the list for M&A due diligence. When combining two companies, they often have different and sometimes even incompatible systems and data. That can create opportunities... [Read More]
by RSS Drew Del Matto  |  Dec 12, 2016  |  Filed in: Business and Technology
San Francisco’s muni fare system was recently hacked, and it turns out that intruders installed ransomware on the system, and demanded money to undo the hack. Some might ask why, despite being located amid a hub of the best brains in cyberspace, didn’t San Francisco muni foresee this coming? But as the saying goes, hindsight is 20/20. A better question to ask is, why are smart cities around the world so prone to such smart attacks? And, what risks can they reasonably foresee, and how do they plan for them? Global Growth and... [Read More]
by RSS Hemant Jain  |  Dec 08, 2016  |  Filed in: Industry Trends
We recently received a URL through Skype that caught our attention. It was a link belonging to LinkedIn, with our Skype ID as a parameter at the end of the URL. https://www.linkedin.com/slink?code=e2nsPHa#jpulusiv=victimskypeid   Usually, people would be wary when they receive links that look somewhat suspicious. But this link is from LinkedIn, the world’s largest networking site, so it would easy for anyone receiving this to quickly dismiss any thought of it being harmful. And the convincing personalized Skype ID at the... [Read More]
by RSS Nelson Ngu  |  Dec 06, 2016  |  Filed in: Security Research
Ensuring data security in financial services is critical to maintaining a positive reputation. Read this post to find out more. [Read More]
by RSS Brian Forster  |  Dec 01, 2016  |  Filed in: Industry Trends
Like every other service provider segment, MSOs are looking for ways to leverage recent changes in technology and customer buying patterns in order to expand their addressable market and service offerings. MSOs now have an opportunity to claim a larger share of this growing business market by providing a new set of commercial services built on a number of new technologies. With the commercial availability of SD-WAN technology, for example, MSO’s now have a path to create competitive offerings that were previously confined to telecommunications... [Read More]
by RSS Rick Mashburn  |  Nov 30, 2016  |  Filed in: Industry Trends
Fortinet’s John Maddison offers some perspective following our Security Fabric and Fabric Ready announcements earlier this year. Can you talk about why “open” is such a critical element of our GTM selling strategy? An “open” strategy demonstrates the maturity of a vendor in their evolution towards developing a complete ecosystem of partnerships. This... [Read More]
by RSS John Welton  |  Nov 28, 2016  |  Filed in: Business and Technology, Security Q & A