Many organizations today are being led to believe that all they need for a secure network is a next generation firewall (NGFW) solution. As countless point-product firewall vendors try to position their product as a silver bullet for all security issues, top security analyst Jon Oltsik of Enterprise Strategy Group unveils the truth: today’s CISOs […]

Highly complex infrastructure systems require protection against cyberattacks. Electricity is so much a part of our everyday lives that we really only think about it when it is not there. That is why it is so important to build better security for our national electric power grid and other critical infrastructure. The power grid is […]

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]

Chapter 1: Preparing to Deploy Data Loss Prevention”  Deploying a data loss prevention (DLP) solution can be intimidating, but take heart—it’s not as daunting as you might think if you approach it step by step. In his four-chapter white paper, Implementing and Managing a Data Loss Prevention Solution, Rich Mogull, analyst and CEO of independent research […]

Time to wind down the Barcelona adventure, and onto Milan now!  This week we have announced some remarkable partnerships within the mobile industry ranging from the biggest handset OEMs, infrastructure providers and mobile network operators. These deep relationships have been established in almost every corner of the mobile ecosystem and we’re all agreed on one […]