Quantcast
Channel: CSO Online - firewall RSS feed
Browsing all 38 articles
Browse latest View live

Top seven firewall capabilities for effective application control

IT administrators try to deliver critical corporate solutions efficiently, but also have to deal with employees using wasteful and often dangerous applications. In order to increase network and user...

View Article



Unified Threat Management Device Roundup

Cyber-attacks are constantly evolving and the attack methods used are constantly adapting. In a similar way, the traditional layers of defence have grown increasingly complex and interrelated. The...

View Article

Cybercrime on the Silverscreen : At the Movies

Hackers, Matrix, Swordfish, Sneakers, Cypher - what's your favourite?

View Article

Disable ‘UPnP’ on networked devices now, say researchers

Security researchers are warning businesses and consumers to immediately disable Universal Plug and Play (UPnP) functions on thousands of networked device products after revealing common flaws that can...

View Article

Traditional firewalls are no good against today’s attacks: F5

Are traditional firewalls sufficient to protect against today’s sophisticated attacks?

View Article


Auscert 2013: Perimeter protection has failed, encryption needs its day in...

In a security industry that hasn't changed much in 20 years, SafeNet's Andrew Younger says, it's strange that nothing much has changed in that time – except that we keep failing.

View Article

WatchGuard XTM 2520

If, as we are often led to believe, colour really is an indication of speed then the WatchGuard XTM 2520 would have to be the fastest hardware firewall solution on the planet. Or at least, in the rack.

View Article

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several...

View Article


Sony Hack Attack

There’s been a lot of coverage recently around Sony Pictures and the hack attack which has placed Sony in the headlines for all the wrong reasons, with high volumes of sensitive company data stolen and...

View Article


Cybersecurity: How Small and Medium Sized Businesses Can Survive

Cybersecurity chiefs aren’t the only ones worrying about hackers these days. Anyone who uses a credit card or stores family photos in the cloud has nagging concerns about data security. Small business...

View Article

Making the case for security

Having been at my new company for several months now, this week I was invited to inform executive management about the state of our security. I had half an hour to formally introduce myself and talk...

View Article

The human firewall has a soft spot: you

For all the talk about the importance of new security technologies, the importance of staff buying into corporate security strategies is often underestimated. In every case, the predictable result is...

View Article

With greater visibility comes increased response

I mentioned in a previous article that we are using a "loaner" Palo Alto Networks firewall, with all the bells and whistles. Our testing led to all sorts of interesting discoveries, and I certainly...

View Article


​How firewall load-balancing optimises security functions in the DMZ

In protecting critical applications, IT professionals need to tread a fine line between enforcing application security against increasingly sophisticated cyber attacks while providing sufficient access...

View Article

Realtime firewall-endpoint links focus, accelerate IT-security response:...

Security administrators can isolate the source of network security breaches and respond much more quickly thanks to a unified architecture in which client and firewall work in lockstep, a Sophos...

View Article


Healthcare held to ransom: how to protect Australian healthcare systems and...

We’ve entered the year faced with a wave of cybercrime attacks on healthcare organisations around the world, showing us yet again that healthcare continues to be a prime target for cyber criminals and...

View Article

10 Essential Online Security Measures to Implement Today

Protecting your network and your sensitive data requires having the right protections in place. Here are 10 of these measure you need to be using.

View Article


Infosec Marketplace

The concept of online marketplaces was pioneered by eBay and Amazon many years ago. But these horizontal marketplaces are now being disrupted by vertical marketplaces such as Uber and Airbnb, which use...

View Article

Infosec Marketplace

The concept of online marketplaces was pioneered by eBay and Amazon many years ago. But these horizontal marketplaces are now being disrupted by vertical marketplaces such as Uber and Airbnb, which use...

View Article

Auscert 2013: Perimeter protection has failed, encryption needs its day in...

In a security industry that hasn't changed much in 20 years, SafeNet's Andrew Younger says, it's strange that nothing much has changed in that time – except that we keep failing.

View Article
Browsing all 38 articles
Browse latest View live




Latest Images