Security

Think Forward.

  • Cybersecurity Executive Orders

President Obama’s Cybersecurity Executive Orders: An Overview

Recognizing National Cyber Security Awareness Month – which takes place every October – couldn’t be more vital given the constant spate of data breaches we hear about day in and day out. National Cyber Security Awareness Month is designed to engage and educate public- and private-sector partners through events and initiatives with the goal of raising awareness about [...]

2015-10-14T13:37:36-04:00October 14th, 2015|Security|
  • SSL Encrypted Traffic

Growth of SSL Encrypted Traffic Poses Challenges

A recent report by Sandvine, a networking equipment company based in Ontario, Canada, shows that encrypted SSL network traffic has been rapidly growing. SSL encrypted traffic in North America, for instance, grew from 2.29 percent in 2013 to 3.8 percent in 2014, while Europe’s encrypted SSL network traffic usage grew from 1.47 percent to 6.1 percent over the [...]

2024-06-17T14:19:09-04:00September 23rd, 2015|Security, SSL|
  • Cyberthreats

CFOs, CIOs Teaming Up to Combat Cyberthreats

Why CFOs and CIOs Should Work Together Global advisory services firm Ernst & Young recently issued a report on the growing collaboration between chief financial officers and chief information officers when it comes to handling cyberthreats. According to the report, titled “Partnering for Performance,” 66 percent of CFOs make cybersecurity a high or very high priority; and 35 [...]

2015-08-27T13:25:13-04:00August 27th, 2015|Cybersecurity, Security|
  • Real-Time Threat Protection

Gigamon, FireEye Deliver Real-Time Threat Protection

Last month, Gigamon, a network visibility, analytics and security firm, announced that its GigaSECURE Security Delivery Platform fully supports and interoperates with network security vendor FireEye’s advanced persistent threat solutions to deliver real-time threat protection. The resulting cybersecurity dream team ensures that FireEye solutions receive the necessary traffic that they need when responding to advanced cyberthreats, while the [...]

2025-02-21T09:22:34-05:00August 25th, 2015|Security|
  • APT Threats

It’s Time to Address the APT Threat

What are APTs? Organizations are increasingly facing targeted cyber-attacks against their systems, known as advanced persistent threats. APT threats can result in the disclosure of sensitive data such as credit card numbers and patient health information. APTs, according to security vendor Trend Micro, are “purpose-built to breach your network and steal your data, intellectual property, and communications without [...]

2015-07-15T12:07:32-04:00July 15th, 2015|Security|
  • venom

VENOM Bug Highlights Risks to Company Data

The recent discovery of the security vulnerability known as VENOM once again highlights the risks organizations face when it comes to protecting their sensitive information. What is VEMON? VENOM, discovered by Jason Geffner of CrowdStrike, an endpoint security provider, can expose access to corporate intellectual property and sensitive and personally identifiable information, “potentially impacting the thousands of organizations [...]

2015-06-12T11:51:05-04:00June 12th, 2015|Security|
  • cyber-attacks

How can Small and Midsize Businesses Protect Themselves Against Cyber-Attacks?

Federal Government Hit by Major Data Breach With news of a massive data breach affecting nearly 4 million current and former US Federal employees, this marks yet another in a seemingly endless string of news about cyber-attacks. The target this time, the Office of Personnel Management, was also the victim of a similar attack last year. Though targets [...]

2024-06-17T14:27:44-04:00June 5th, 2015|News & Press, Security|
  • email security

The Need for Email Security in Curbing Advanced Persistent Threats (APT) Attacks

Importance of Email Security Email security is important now more than ever as organizations face an ever-increasing number of threats from email-based spam, viruses and advanced attacks. The issue recently saw renewed attention following reports that U.S. Presidential candidate Hillary Clinton used a private email account and server to conduct official business while she was working for the [...]

2024-06-19T10:56:44-04:00May 26th, 2015|Security|
  • penetration testing

Penetration Testing: Staying One Step Ahead of the Hackers

As hackers continue to identify and exploit vulnerabilities within organizations’ systems to obtain sensitive information, companies need to conduct penetration testing to find and remediate those flaws. What is a Penetration Test? A penetration test looks for ways to exploit vulnerabilities to circumvent or defeat the security features of a company’s system components, according to the PCI Security [...]

2015-05-15T11:39:06-04:00May 15th, 2015|Penetration Testing, Security|
  • cybersecurity

Cybersecurity Spending Increases Following Large-Scale Breaches

Anthem Inc. JPMorgan Chase. Home Depot. Recent data breaches at these organizations, which affected millions of customers and disclosed sensitive information, show that all companies need to make cybersecurity a priority. Increase in Cybersecurity Spending This concerning trend is contributing to a growing increase in cybersecurity spending, according to Gartner Inc., an information technology research and advisory company. [...]

2025-02-19T12:05:00-05:00April 21st, 2015|Cybersecurity, Security|
Go to Top