With comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.
As cyberattacks on healthcare entities continue to surge, federal regulators are urging organizations to safeguard network-attached storage devices and other gear that supports or enables file transfer protocol services.
Information security weaknesses that a watchdog agency found at the FDA are similar to those found at many healthcare organizations, some security experts say. But the FDA should be held to an even higher standard than the organizations that implement FDA-regulated drugs and devices, they argue.
There are a wide variety of known security issues with printers and other peripheral devices. This report from Red Tiger Security shows how these devices can be exploited—and how to protect yours from threat.
Read this report to learn why:
Printers and embedded devices are often the weakest link in IT...
This research report from the Ponemon Institute provides an in-depth look into the security risks created by insecure printers and other devices, with a focus on strategies and best practices that can address these risks.
This report reveals why:
53% of IT managers realize printers are vulnerable to cyber...
Through extensive research and interviews, IDC was able to better understand the quantitative and qualitative of an organization's use of enterprise security solutions—and the business value of deploying a print security solution.
See the results.
This whitepaper explores why:
80% of companies indicate that...
Right now, it is almost certain that more than 25% of the third-party apps connected to your corporate environment are considered "high-risk." When there is no longer an identifiable network perimeter, securing your company's IP can be a lot of pressure.
That's where Cloud Access Security Brokers (CASBs) come in. A...
Cisco has patched another zero-day flaw stemming from the Shadow Brokers' leak of Equation Group tools and attack code. The technology giant warns that attackers have been exploiting the vulnerability.
All in the family: A "sophisticated attacker" alert from US-CERT, urging enterprises to lock down their networking gear, was triggered by the leak of exploit tools - targeting, in part, U.S.-built networking gear - that may have been tied to the NSA.
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates, which are already selling for more than $1,000 each in...
Data centers are difficult to defend, and securing the perimeter is important but of little consequence if attackers get inside. But there are ways to lock down data centers, former White House strategist Nathaniel Gleicher explains in this interview.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
Just as seasonal flu viruses change from year to year, so too malware threats quickly evolve, necessitating a behavioral-based approach to security, says John Woods, CISO of pharmacy software vendor PDX Inc.
The Department of Health and Human Services offers a model for applying multifactor authentication for privileged users, a new report illustrates. On the other hand, a second report shows HHS, like many healthcare organizations, is struggling to manage wireless security vulnerabilities.
Cisco has begun releasing updates for all ASA devices to patch them against a buffer overflow vulnerability that was targeted by leaked Equation Group attack tools. Attackers can exploit the flaw to gain remote control of ASA devices.