Securing networks is a form of breach insurance
For whatever reason, an employee went from gruntled to disgruntled. So he set up a back door using log me in, registering with his personal email address. Then he changed employers. Leo Cole, Trustwave...
View ArticleHistory will repeat… only the devices will be different
Kevin Haley, director, Symantec Security Response, spoke with us about what he expects to see next year. Kevin Haley, Symantec The first is “People will finally begin taking active steps to keep their...
View ArticleRemoving two roadblocks to portable networks
Designed to allow users to quickly establish fast and reliable connectivity for field workers at remote or temporary worksites, LINCWorks RDA (Rugged Deploy Anywhere) self-contained portable units use...
View ArticlePhishing has evolved – what to expect
Understanding that some of the more basic tactics aren’t as successful anymore, phishers have moved to targeted examples, and into social media. Carl Leonard, Websense Why is this so key for businesses...
View ArticleTwo reasons why you must treat wireless like a WAN
Having been in the industry for some time, Fortinet senior product manager Kevin Flynn has experienced major change adoption every few years. Kevin Flynn, Fortinet Every major change adoption requires...
View ArticleAre you a Yes organization or a No organization?
Five years ago Dr. Walid Hejazi, professor of Business Economics, Rotman School of Management, began a study commissioned by TELUS, asking security professionals what keeps them up at night. Walid...
View ArticleA Third reason why you must treat wireless like a WAN
Read Reasons 1 and 2 here The third factor changing network security is User Licenses. Many times firewall vendors sell according to number of users… if you have 10 users the cost is x and if 50 users,...
View ArticleA secured buying experience is attainable
by John Maddison, vice president of marketing for Fortinet John Maddison, Fortinet Globally, the retail industry is among the top three industries to be targeted by cyber criminals. Due to the sheer...
View ArticleLo-tech hack overrides search engine results
Well-known marketer and Target Marketing publisher Denny Hatch noticed that Aunt Joy’s Personalized Christmas Stockings website was redirecting to a Chinese site selling something else. Aunt Joy They...
View Article
More Pages to Explore .....