One area of network security that organizations may want to revisit is their hardware practices. Here are a few hardware-related requirements of PCI DSS.
Everyone's Blog in Network Security
As always, 2017 promises to be a year of security challenges among network administrators and security specialists. The ever-expanding presence of workforce mobility, the Internet of Things, and more makes keeping up with the latest security best practices as important as ever. Here are 10 important network security needs in 2017:
Network security is ever-changing and impossible to get right every time. In contrast, a hacker only has to be right once to breach a network. How can enterprises prioritize their efforts?
As usual, RSA included hot-button news stories (Apple vs. the federal government), calls to action, and a slew of over-the-top security technologies. Here are my three key takeaways from RSA 2016.
Being able to evolve rapidly has always been a cornerstone of business success, and today’s companies are under more pressure than ever to transform, expand, and mobilize. Hackers and malicious individuals are taking notice, and have learned how to exploit the vulnerabilities inherent in an increasingly mobile business paradigm.
Whether guarding against inappropriate student web surfing or serious network attacks, choosing a leading cloud-managed routing solution provides schools with the ability to cost-effectively keep their networks secure.
Part 3 of the three-part security series takes a look at the spooky network threats companies are facing and strategies to mitigate hacking risks.
From remote cloud management and high-end scalability to intelligent failover and strong, simplified security, IT managers are getting the most out of 4G LTE and the Store of the Future.
Last week the OpenSSL project released an advisory that describes a new SSL vulnerability. Now commonly known as “POODLE” ("Padding Oracle On Downgraded Legacy Encryption"), this vulnerability is less dangerous that its predecessor, the Heartbleed bug—primarily because of the conditions needed to exploit it (see below).
In my previous blog post (7 Technologies that Impact PCI), I gave an overview of Steven Orfei’s presentation at the PCI Security Standards Council’s 2014 North American Community Meeting in Orlando, Florida. In this post, I’ll talk about another presentation from that same event.