You Are Browsing ‘Data Security ’ Category

Comments Off on Demand More: Get the Most from the Move to a Next-Generation Firewall
As next-generation firewall (NGFW) technology becomes more mainstream, it is time to review the advanced capabilities and features that separate the leaders from the laggards. At its most basic, the consensus of a NGFW definition would include these capabilities – standard firewall features like stateful inspection and network address translation, integrated intrusion prevention, application awareness and some level of intelligence and integrat...
Comments Off on History of Cryptograpy – An Easy to Understand History of Cryptography
The go-to method of securing sensitive information and ensuring privacy has always been encryption, and to best utilize it, you need to understand it backwards and forwards, because hackers sure do. This informative paper takes a detailed look at the history of cryptography, going as far back as Ancient Babylon, to give you a thorough understanding of the evolution and application of encrypting important information. Read on to learn about the past...
Comments Off on Fraud Alert: New Phishing Tactics — and How They Impact Your Business
Phishing attacks are still around a) because they’re easy to execute, and b) because they generally work. Did you know 800,000 users click on malicious links every single day? This white paper outlines a number of best practices that will help protect your organization and your users from phishing attacks and details the latest phishing trends that you need to know about. View now to learn more! ...
Comments Off on How to Choose a Certificate Authority for Safer Web Security
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the...
Comments Off on Choose the Right Security Solution: Moving Beyond SSL to Establish Trust
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions. ...
Comments Off on Endpoint Security: It’s Not Just Black or White
Learn how the meshed defense of blacklisting and whitelisting can detect and block both malicious payloads and malicious actions that compromise a system and its network infrastructure. ...
Comments Off on AV TEST Report: Proactive Rootkit Protection Comparison Test
Growth rates in malware show the need for pro-active protection measures against zero-day attacks. Learn from AV TEST how the pro-active approach of McAfee's Deep Defender is capable of providing a very good level of protection against kernel-mode and MBR rootkits. ...
Comments Off on NSS Labs Report: Corporate AV/EPP Comparative Analysis
The results of NSS Labs in-depth testing of 41 individual exploits and over 200 attack scenarios reveals significant differences in the defensive capabilities of 11 leading endpoint protection solutions. ...
Comments Off on SANS Whitepaper: Correlating Event Data for Vulnerability Detection and Remediation
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting. ...
Comments Off on Financial Services Firms Remain Vulnerable to Insider Attacks
Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of recruiting the best and brightest security talent. In spite of these advantages, financial services firms remain nearly as vulnerable to insider ...