Here is a list to help develop an all-star team of employees that will protect your information.
- By Matt Holden
- Jul 28, 2014
6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.
- By Benjamin Powell
- Jul 14, 2014
Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.
- By Mig Paredes
- Jun 30, 2014
When a successful European toy manufacturer outgrew its facilities, it built a new, three-facility campus that included an office along with manufacturing and warehouse space.
- By Susan Stanley
- Jun 01, 2014
When most people consider cybersecurity, they think about protecting the information that resides on their computers—sensitive emails, folders or files.
- By Mauricio Chacon
- May 01, 2014
Philosophical and physical shifts in intelligence and management at the edge are remaking corporate networks.
- By Vince Ricco
- May 01, 2014
Datacenter traffic is predicted to triple by 2017 with the cloud as the biggest traffic source, according to a recent Cisco Global Cloud Index study.
- By Charles P. Williams
- May 01, 2014
Ensuring the safety and security of patients and employees is critical to healthcare organizations of any size. For larger facilities, the task can seem monumental, leading many in the industry to turn to IP network surveillance technology to help take control of the process.
- By Greg Peratt
- May 01, 2014
“Banks Heap Suits on Target over Breach,” read a recent headline of a Wall Street Journal story. By that time, seven financial institutions had already filed class action suits against the retail giant alleging it did not sufficiently protect its customer’s data.
- By David Rizzo
- May 01, 2014
When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.
- By Sumeet Sabharwal
- Apr 01, 2014
Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.
- By Cosimo Malesci
- Apr 01, 2014
Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
It is no exaggeration to say that network video technology has revolutionized the video surveillance market, and the access control industry is on the verge of a similar revolution.
- By Ola Jönsson
- Feb 06, 2014
The Virtual Desktop Infrastructure (VDI) market is growing fast so much that industry analysts predict it will be worth over $5 billion within the next three years. Why did this take so long to arrive? After all, virtual desktops have been around since the 1990s.
- By Charles P. Williams
- Feb 05, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
An Advanced Persistent Threat (APT) is a piece of malware that is distinguished by the sophistication of its code, the vectors cybercriminals are choosing for attack and the perseverance with which they’re going after their targets.
- By David Finger
- Feb 04, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
The one thing consistent about malware attacks is that they continue to change quite a bit as time goes by. Initially, many attacks were unstructured and untargeted, indiscriminately honing in on large numbers of hosts in an attempt to find their vulnerabilities. The outcome of these initial attacks was often simple defacement or destruction of data with very few of the overall volume of these attacks covered in the news.
- By Brian Laing
- Feb 04, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
Cybercrime is on the rise, and sensitive, corporate information is one of the top targets of external and internal attacks.
- By Márton Illés
- Dec 01, 2013