The Ideal Network Security Perimeter Design: Part 2 of 3
In our first blog on ideal network security perimeter design, we looked at how to harden and configure your network as well as understanding what outsiders can see. In part 2 we'll examine the numerous...
View ArticlePCI-DSS 3.0 - What it Means to You and Your Business
The PCI Council just announced the revisions planned for PCI-DSS 3.0 and while the updated PCI compliance requirements don’t take effect until January 1, 2015, now is a good time to start planning...
View ArticleCloud Security: You can get there from here!
If you have ever asked for directions while driving in Boston, then you have undoubtedly been told “you can’t get there from here”. It sounds silly, but after driving around in circles you become...
View ArticleSpooky Network Security and Operations Incidents
Since it's Halloween, I thought it would be fun to revisit some chilling tales of network operations and security incidents. Ghosts and goblins aren't the culprits here… just network and security...
View ArticleMigrating your data center to the cloud - a network security perspective
The “cloud” is a hot topic in the network security world these days as many organizations want to take advantage of the many benefits that the cloud has to offer by starting to plan data center...
View ArticleTips to Migrate Your Data Center to a Private Cloud without Disruption
Your data center(s) and the cloud. There a lot of reasons, including financial and operational benefits, that the cloud has to offer. At the same time making the move to the cloud is no easy project –...
View ArticleWhat You Need to Know about PCI-DSS 3.0 When it Comes to Your Firewalls and...
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities. The updated standard introduces more flexibility and an increased...
View ArticleConversation with a CISO on Networking and Security Trends
I recently had the opportunity to sit down with Conrad Menezes to discuss some of the current and future networking and security trends and challenges facing organizations. Conrad held senior...
View ArticleKey Findings from the State of Network Security 2014
Today we published our third annual State of Network Security survey findings, which explore key risks in organizations’ security management practices and access to critical applications in the data...
View ArticleSecurity Orchestration - From data center to cloud
The modern data center has become the home of next-generation technologies. The proliferation of cloud computing and the data-on-demand generation has created new types of challenges for today’s IT...
View ArticleFive next-gen security tools to consider for your cloud-ready infrastructure
The modern data center has truly evolved. We’re now seeing the emergence of a truly interconnected cloud platform spanning numerous heterogeneous platforms. Throughout all of this – security continues...
View ArticleThe future of the cloud firewall
With so many environments and organizations moving into the cloud – it only made sense for the security part of it all to make an impact as well. Modern security technologies have advanced much further...
View ArticleThe Neglect of Security Basics
Last week we held a webinar with our good friends from Qualys (you can view the recording here). The webinar discussed the integration between Qualys and AlgoSec that enables Application-Centric...
View ArticleOnward Through the Cloud...Securely
Over the past couple years anything with the word “cloud” in it has been selling big. It's been the ultimate buzzword in marketing and has completely clouded (pun intended) the understanding of what...
View ArticleNever Forget the Physical Aspects of Corporate Security
It’s all about cloud computing these days. Our ability to deliver rich content, streamline data control, and develop advanced virtual technologies are all fueling the expansion of the cloud...
View ArticleClueless About Network Security in the Cloud? You’re Not Alone
Over the next few years, organizations of all sizes will be deploying a good chunk of their business applications on a public IaaS platform. Not surprisingly, network security is a big concern for them...
View ArticleWhere Were You Born?
Exciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed...
View ArticleNetwork Security in Hybrid Cloud Environments: Separating the Myths from the...
As we found out in our recent survey, network security and data security are the two most challenging security functions to migrate to cloud environments. Specifically, the problems highlighted in...
View ArticleLook Before You Leap: Tips to Help You Manage Your Security Policy Across a...
This situation may sound familiar – your CEO, CIO, or another executive outside of the security organization summons you to a meeting. “We have decided to move [Enter unreasonable number here] of our...
View ArticleReaching for Cloud Nine: Tips to Help You Prepare to Launch Business...
According to a recent survey, two thirds of organizations are currently deploying or planning to deploy business applications on a public cloud infrastructure. If your organization is among them...
View Article
More Pages to Explore .....