• CONTACT US
  • Create Free Account
  • Login
NSS Labs
  • About
    • History
    • Types of Reports
  • Technologies Covered
  • Library Access
Select Page

Enterprises Are Not Properly Protected against DDoS Attacks

by John Whetstone | Oct 30, 2017 | Blog

Distributed denial-of-service (DDoS) attacks are nothing new, yet these attacks remain one of the most common causes of high-profile outages and interruptions of client-facing services. DDoS attacks are often linked to acts of hacktivism and are perpetrated by...

Tunneling through the Sky – Using SSH/RDP to Cross the Network Perimeter

by Jason Pappalexis | Oct 25, 2017 | Blog

Readers of classic science fiction will likely recognize the reference to Robert Heinlein’s 1950s novel. In this futuristic tale, the characters must use a tunnel between Earth and an unfamiliar (and inhospitable) planet in order to take a survival test. The novel has...

Communication on the Edge: Secure Email Gateways

by Jason Pappalexis | Oct 23, 2017 | Blog

The 25 (SMTP), 80 (HTTP), and 443 (HTTPS) ports are widely utilized and form the core of business communication. By design, these ports are open across perimeter firewalls. However, this clear line of sight from the dark alleys of the external world to the safe haven...

NSS Labs Announces 2017 Breach Detection Systems Group Test Results

by NSS Labs | Oct 19, 2017 | Press

4 Products Receive Recommended Rating; 1 Receives Neutral Rating; 1 Receives Security Recommended Rating;   1 Receives Caution Rating AUSTIN, Texas – October 19, 2017 – NSS Labs, Inc., a global leader and trusted source for independent fact-based cybersecurity...

Security Information and Event Management – A Look at US Deployments in 2017

by Jason Pappalexis | Oct 16, 2017 | Blog

The volume of log and alert data from just a small number of security products can easily overwhelm a security team—even a well-funded one. “Alert fatigue” is real, and so data consolidation is helpful, not only for timely content consumption, but also to determine...

NSS Labs Conducts First Cross-Platform Test of Leading Web Browsers

by NSS Labs | Oct 12, 2017 | Press

Findings Provide Insights for Enterprises Adopting Dual-Browser Strategies AUSTIN, Texas – October 12, 2017 – NSS Labs, Inc., a global leader and trusted source for independent fact-based cybersecurity guidance, today announced the release of its Web Browser Security...

Breach Detection Systems – A Look at US Deployments in 2017

by Jason Pappalexis | Oct 9, 2017 | Blog

Breach detection systems (BDS) are physical devices, virtual appliances, cloud services, or managed services that utilize both static analysis and behavioral analysis techniques to detect advanced malware, zero-day attacks, and targeted attacks that have bypassed a...

The Cloud and Shared Responsibility: It’s Not Me, It’s You

by John Whetstone | Oct 4, 2017 | Blog

Some might say that if marketing departments and encryption have anything in common, it’s the ability to obfuscate a message. A perfect example of this is the term “cloud”—surely one of today’s most overused and abused terms. You can’t turn on the television or go...

Detection and Prevention: The IPS in the US Enterprise

by John Whetstone | Oct 2, 2017 | Blog

Intrusion prevention systems (IPS) analyze network packets for exploits, protocol irregularities, and security policy violations. When an event is detected, the IPS sends an alert and relevant log information for security operations teams to review and act on. The IPS...

Recent Posts

  • NSS Labs Announces New Web Browser Security Test Results
  • New Advanced Endpoint Protection (AEP) Comparative Ratings Report Out Today
  • NSS Labs Announces New Ratings System Along with Advanced Endpoint Protection Results
  • NSS Labs Announces 2019 Data Center Firewall / Security Gateway Group Test Results
  • NGIPS 5.0 ERRATA – PALO ALTO Networks

Recent Comments

    Archives

    • July 2020
    • June 2020
    • February 2020
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • April 2014
    • March 2014
    • February 2014
    • January 2014
    • December 2013
    • September 2013
    • July 2013
    • June 2013
    • May 2013
    • February 2013
    • January 2013
    • November 2012
    • October 2012
    • September 2012
    • August 2012
    • July 2012
    • February 2012

    Categories

    • Blog
    • Press
    • Videos

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    • History
    • Types of Reports
    • Library Access
    CyberRatings.org

    2303 Ranch Road 620 South
    Suite 160, #501
    Austin, TX 78734

    Phone: +1(512)333-1734
    Fax: +1(512)727-2130

    Contact
    info@cyberratings.org press@cyberratings.org
    Twitter Linkedin
    Legal

    Terms of Service
    Privacy Policy
    Cookie Policy
    Copyright and Quote Policy

    ©2022 CyberRatings.org