by Jason Pappalexis | Aug 18, 2016 | Blog
Choosing a security product is challenging no matter the technology or industry vertical. Many factors come into play, including price, security effectiveness, performance, management, workflow, deployment architecture, and interoperability. It can easily take months...
by Jason Pappalexis | Aug 10, 2016 | Blog
Organizations understand the value of keeping an in-house malware research team “plugged in” and ready to analyze files at any time, and this emphasizes the value of the breach detection system (BDS).A brushed steel, open lock with a background of code Breach...
by Jason Pappalexis | Dec 21, 2015 | Blog
UPDATE: As of December 23rd, we have learned that even when the usernames are changed on an unpatched Juniper product, the device can still be compromised. Therefore, it is urgent that Juniper customers patch their devices immediately. On December 17, Juniper Networks...
by Jason Pappalexis | Dec 17, 2015 | Blog
The secure web gateway (SWG) product has been a mainstay of security best practices for the past 20 years. The rise of the web as a business and educational resource initially made these products mandatory tools for compliance, and their security use case was soon...
by Jason Pappalexis | Mar 5, 2015 | Blog
OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE FINAL IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS). As the breach...
by Jason Pappalexis | Mar 4, 2015 | Blog
OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE SECOND IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS). The importance of...
by Jason Pappalexis | Mar 2, 2015 | Blog
OUR APPROACH TO SECURING THE ENTERPRISE HAS CHANGED, AND BREACH DETECTION TECHNOLOGY HAS BEEN LARGELY INSTRUMENTAL IN THIS PROCESS. THIS REPORT FROM NSS LABS IS THE FIRST IN A THREE-PART SERIES ON THE IMPACT OF THE BREACH DETECTION SYSTEM (BDS). One of the newest...
by Jason Pappalexis | Nov 18, 2014 | Blog
Today’s continuously evolving threat landscape and the need for business continuity mandate the need to rethink security workflows. Robust virtual data centers and considerable computing power are the ingredients for a new approach to securing critical data. With an...
by Jason Pappalexis | Jul 23, 2014 | Blog
As any enterprise research manager or IT buyer will attest, finding the right information – and at the right time – is difficult at best. Oftentimes, multiple sources are used to answer one particular question – and then additional tools must still be used to validate...
by Jason Pappalexis | Jun 10, 2014 | Blog
We have to get smart about how we perform security: sophisticated threats require sophisticated countermeasures. The premise sounds simple enough, but the security market is being turned on its head as the effectiveness of legacy technologies such as antivirus is...
by Jason Pappalexis | Apr 16, 2014 | Blog
Interop is promoted as a technology conference and traditionally has covered a range of interoperability topics, from core infrastructure up to applications. The conference also provides attendees with information on current security trends. This year, keynotes spoke...
by Jason Pappalexis | Apr 9, 2014 | Blog
Incident response (IR) is a key process designed to provide context, priority, and ultimately, closure for the events associated with an attack. When enterprise defenses falter, an IR process should give the information security (IS) team enough information to...