Ryan Francis

Author Archives: Ryan Francis

What to look for in endpoint detection and response tools and services

What you need to knowOrganizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus. As cybercriminals utilize customized malware and bypass traditional antivirus solutions, it’s become necessary to take a broader and more proactive approach to protect the endpoint. This means real-time monitoring, detection and advanced threat analysis coupled with response technology.To read this article in full or to leave a comment, please click here

What to look for in endpoint detection and response tools and services

What you need to knowOrganizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus. As cybercriminals utilize customized malware and bypass traditional antivirus solutions, it’s become necessary to take a broader and more proactive approach to protect the endpoint. This means real-time monitoring, detection and advanced threat analysis coupled with response technology.To read this article in full or to leave a comment, please click here

New products of the week 8.29.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ASG-Mobius 6.0Key features: ASG-Mobius 6.0 is a purpose-built content management system with proven scalability supporting platform, device and data independence. New AWS support enables cloud based solutions, on premise or hybrid implementations. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.29.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ASG-Mobius 6.0Key features: ASG-Mobius 6.0 is a purpose-built content management system with proven scalability supporting platform, device and data independence. New AWS support enables cloud based solutions, on premise or hybrid implementations. More info.To read this article in full or to leave a comment, please click here

What you need to do to stop data from leaving with exiting employees

It may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.Biscom’s national study around data in the workplace revealed that more than one in four employees leave their job with company data. The study spotlights employees as a big security vulnerability to business data. To help prevent this, Bill Ho, CEO of Biscom, offers a few tips to minimize this threat.1. Establish clear employee policies on handling company data and informationTo read this article in full or to leave a comment, please click here

What you need to do to stop data from leaving with exiting employees

It may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.Biscom’s national study around data in the workplace revealed that more than one in four employees leave their job with company data. The study spotlights employees as a big security vulnerability to business data. To help prevent this, Bill Ho, CEO of Biscom, offers a few tips to minimize this threat.1. Establish clear employee policies on handling company data and informationTo read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.22.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Fortscale 2.7Key features: Detecting insider credentials compromised on the Dark Web and remote lateral movement. Plus, new user experience that makes it easier for security professionals to identify and stop insider threats automatically. More info.To read this article in full or to leave a comment, please click here

8 tips for keeping your data safe with Identity and Access Management

Safe and soundImage by ThinkstockNew web applications are making their way into the workplace at an unprecedented rate. By 2017, enterprises are projected to rely on an average of 52 cloud applications at work, leaving employees with a pool of credentials to keep track of. If you don’t take the necessary precautions to keep your credentials secure, your accounts and data are at risk of being compromised. With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly evolving threat landscape. Richard Walters, senior vice president of security products at Intermedia, offers these tips.To read this article in full or to leave a comment, please click here

New products of the week 8.15.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.24-Port Dual GigE Console ServerKey features: A 24-port, out-of-band console access solution.  Includes dual 10/100/1000Base-T Ethernet ports to allow connection to both a primary production network and a secondary maintenance network.  Also features dual power inlets. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.15.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.24-Port Dual GigE Console ServerKey features: A 24-port, out-of-band console access solution.  Includes dual 10/100/1000Base-T Ethernet ports to allow connection to both a primary production network and a secondary maintenance network.  Also features dual power inlets. More info.To read this article in full or to leave a comment, please click here

6 shocking gaps in your data security strategy

Crumbling wallsImage by Steve TraynorDespite billions of dollars invested in cybersecurity, businesses lose critical data daily. We’ve secured our organizations like fortresses, building layers of walls around networks, applications, storage containers, identity, and devices. But when an unhappy employee moves high-value designs onto a USB drive or sends important email attachment outside the “secure” network, those walls crumble the moment we need them the most.To read this article in full or to leave a comment, please click here

6 shocking gaps in your data security strategy

Crumbling wallsImage by Steve TraynorDespite billions of dollars invested in cybersecurity, businesses lose critical data daily. We’ve secured our organizations like fortresses, building layers of walls around networks, applications, storage containers, identity, and devices. But when an unhappy employee moves high-value designs onto a USB drive or sends important email attachment outside the “secure” network, those walls crumble the moment we need them the most.To read this article in full or to leave a comment, please click here

How to block phishers when they come a knockin’

Just like throwing out a fishing line into the water, a phisher waits for just the slightest nibble before pouncing on a network. Eyal Benishti, CEO of IronScales, says the way to cut off the phishers food supply is to first go to the core of the issue: employee awareness. The CEO notes that cybercriminals by nature are lazy. “If your organization is a tough nut to crack, they will move on to find more low-hanging fruit,” Benishti says. According to the Verizon data breach investigation report published earlier this year, phishing remains a major data breach weapon of choice. Trend Micro added that ransomware is expected to be one of the biggest threats in 2016 and that a single ransom demand will go much higher, reaching seven figures.To read this article in full or to leave a comment, please click here

How to block phishers when they come a knockin’

Just like throwing out a fishing line into the water, a phisher waits for just the slightest nibble before pouncing on a network. Eyal Benishti, CEO of IronScales, says the way to cut off the phishers food supply is to first go to the core of the issue: employee awareness. The CEO notes that cybercriminals by nature are lazy. “If your organization is a tough nut to crack, they will move on to find more low-hanging fruit,” Benishti says. According to the Verizon data breach investigation report published earlier this year, phishing remains a major data breach weapon of choice. Trend Micro added that ransomware is expected to be one of the biggest threats in 2016 and that a single ransom demand will go much higher, reaching seven figures.To read this article in full or to leave a comment, please click here

New products of the week 8.8.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Open Threat Exchange (OTX)Key features: AlienVault OTX is an open threat intelligence community where security practitioners research and share emerging threat data. Members can create private discussion groups related to specific industries, regions and threats. More info.To read this article in full or to leave a comment, please click here

New products of the week 8.8.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Open Threat Exchange (OTX)Key features: AlienVault OTX is an open threat intelligence community where security practitioners research and share emerging threat data. Members can create private discussion groups related to specific industries, regions and threats. More info.To read this article in full or to leave a comment, please click here

How can you detect a fake ransom letter?

Pay up?Image by Flickr/Nick O’NeilIn the 2016 Executive Application & Network Security Survey, among those who have not experienced a ransom situation, the majority say they would not pay a ransom. But among the few who have experienced a ransom attack, more than half in the U.S. did not pay. One respondent indicated that paying did not guarantee that the attacker would do their part.To read this article in full or to leave a comment, please click here

How can you detect a fake ransom letter?

Pay up?Image by Flickr/Nick O’NeilIn the 2016 Executive Application & Network Security Survey, among those who have not experienced a ransom situation, the majority say they would not pay a ransom. But among the few who have experienced a ransom attack, more than half in the U.S. did not pay. One respondent indicated that paying did not guarantee that the attacker would do their part.To read this article in full or to leave a comment, please click here

1 15 16 17 18 19 25