• CONTACT US
  • Create Free Account
  • Login
NSS Labs
  • About
    • History
    • Types of Reports
  • Technologies Covered
  • Library Access
Select Page

John Whetstone

NSS Labs’ 2019 Cyber Predictions

by John Whetstone | Nov 28, 2018 | Blog

Those of you in the trenches of cybersecurity likely share a perspective held by many of us at NSS Labs: “the only constant is change.” In other words, as threats continue to evolve, so must the employees who use the data and the products deployed to...

What’s Driving the Adoption of CASBs?

by John Whetstone | Nov 6, 2018 | Blog

The more cloud applications and services an organization adopts, the more vulnerable it becomes—that is, unless it has implemented the appropriate security protections to defend these new apps and services. What security technology is best suited for this task? If you...

“Top Secret” – But According to What Standard?

by John Whetstone | Aug 29, 2018 | Blog

In a previous blog, I discussed the importance of understanding data ownership roles in the cloud. Today’s blog discusses two practices every organization utilizing cloud-based services should implement: data categorization and data classification. Flexible Guidelines...

Who is Responsible for Data Stored in the Cloud?

by John Whetstone | Jun 29, 2018 | Blog

Understanding who is responsible for an organization’s data is essential for security. Unfortunately, when data is stored in the cloud, the waters get rather muddied. Evidence of a disconnect was revealed during the NSS Labs 2017 Shared Responsibility Study, in which...

Considering a CASB Purchase? Get Some Strategic Guidance.

by John Whetstone | Jun 5, 2018 | Blog

In a blog published in January (Visibility in the Cloud and the Role of the CASB), I discuss the growing interest expressed by our enterprise clients in cloud access security brokers (CASBs). Throughout our discussions with these clients there has been a consistent...

OAuth: Convenience at a Cost

by John Whetstone | Mar 29, 2018 | Blog

Throughout my research into cloud security, the topic of identity management is always present. In fact, many in the industry feel that when it comes to securing the cloud, identity is the new perimeter. The challenge here is that most users require access to many...

Visibility in the Cloud and the Role of the CASB

by John Whetstone | Jan 24, 2018 | Blog

If I had to guess which topic NSS Labs discusses most often with clients, regardless of organization size, it would have to be network visibility. But it isn’t just our clients that want to know more on this topic, enterprises throughout the US lack visibility into...

US Enterprises Are All in on SD-WAN

by John Whetstone | Jan 15, 2018 | Blog

Back in September of 2017, we published a blog that posed the question, “Is SD-WAN ready for prime time?”. The blog encouraged enterprises to ask themselves four fundamental questions prior to purchasing SD-WAN technology: How secure is it? Which security components...

2018 Security Predictions: Change Will Remain Constant

by John Whetstone | Dec 6, 2017 | Blog

The only constant in security is change. Over the last few years, we have witnessed a growing consensus among security practitioners that everyone is at risk of a breach, and that it is hard to do security well all the time. At NSS Labs, we spend our days helping...

Old Stateful – Holding Its Own After More Than Two Decades

by John Whetstone | Nov 9, 2017 | Blog

First patented in 1994 by Check Point Software, stateful firewalls are an evolution of the packet filtering firewall. Stateful firewalls were a game changer because they introduced state tables, which permit a firewall to store the status (or state) of each network...

Enterprises Are Not Properly Protected against DDoS Attacks

by John Whetstone | Oct 30, 2017 | Blog

Distributed denial-of-service (DDoS) attacks are nothing new, yet these attacks remain one of the most common causes of high-profile outages and interruptions of client-facing services. DDoS attacks are often linked to acts of hacktivism and are perpetrated by...

The Cloud and Shared Responsibility: It’s Not Me, It’s You

by John Whetstone | Oct 4, 2017 | Blog

Some might say that if marketing departments and encryption have anything in common, it’s the ability to obfuscate a message. A perfect example of this is the term “cloud”—surely one of today’s most overused and abused terms. You can’t turn on the television or go...

Detection and Prevention: The IPS in the US Enterprise

by John Whetstone | Oct 2, 2017 | Blog

Intrusion prevention systems (IPS) analyze network packets for exploits, protocol irregularities, and security policy violations. When an event is detected, the IPS sends an alert and relevant log information for security operations teams to review and act on. The IPS...

Protecting Against Malware Delivered via Social Networking

by John Whetstone | Sep 25, 2017 | Blog

Meet Ben, an accountant for a technology startup in Austin. After a great weekend with his pals at Austin City Limits, Ben heads to the office. He logs into his computer and goes through his work emails. Next, he fires up his web browser and navigates to Gmail. He...

Don’t Stick That in the Socket!

by John Whetstone | Sep 11, 2017 | Blog

Chances are your mother has yelled this at you at least once. However, contrary to what she might have had you think, sockets aren’t always a bad place to stick things. This is especially true when we share information across nonsecure channels, such as the Internet....
« Older Entries

RECENT POSTS

  • NSS Labs Announces New Web Browser Security Test Results July 14, 2020
  • New Advanced Endpoint Protection (AEP) Comparative Ratings Report Out Today June 16, 2020
  • NSS Labs Announces New Ratings System Along with Advanced Endpoint Protection Results February 25, 2020
  • NSS Labs Announces 2019 Data Center Firewall / Security Gateway Group Test Results November 12, 2019
  • NGIPS 5.0 ERRATA – PALO ALTO Networks October 8, 2019
CyberRatings.org

2303 Ranch Road 620 South
Suite 160, #501
Austin, TX 78734

Phone: +1(512)333-1734
Fax: +1(512)727-2130

Contact
info@cyberratings.org press@cyberratings.org
Twitter Linkedin
Legal

Terms of Service
Privacy Policy
Cookie Policy
Copyright and Quote Policy

©2022 CyberRatings.org