2014

Remote Access VPNs For Dummies
2 Factor Authentication · VPN

Why Two-Factor Authentication is Too Important to Ignore

Remote Access VPNs For Dummies
Rethink Remote Access · VPN

When Remote Access Becomes Your Enemy

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component...

Shellshock Leaves Deep Impact on Network Security
Industry Commentary · IPsec · IT policy · VPN

Shellshock Leaves Deep Impact on Network Security

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security...

Remote Access VPNs For Dummies
Industry Commentary · IT policy

Network Security for CIOs: A Marathon or a Sprint?

The crack of the starting gun has very different meanings for runners, depending on the distance of their race. To marathoners, it means to start conserving their energy as they take the first step in...

Remote Access VPNs For Dummies
Industry Commentary · IT policy · VPN

Industry 4.0: Flexible Production Needs Secure Networking

As we sit on the edge of the fourth industrial revolution, businesses are preparing for sweeping technological changes that will impact their production. Governments around the world, particularly...

Remote Access VPNs For Dummies
Industry Commentary · VPN

No Quick Fixes for Home Depot After Record Cyberattack

Home Depot fixes America's household problems. If you're planning a do-it-yourself project, whether it's repairing a leaky faucet or installing new linoleum flooring, you're probably going to visit a...

Dollar Bill
Endpoint Management · Industry Commentary

Who Will Foot the Bill for BYOD?

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or,...

Remote Access VPNs For Dummies
Industry Commentary

The Next 'Black Swan' Event: A Cyberattack?

Sprinkled throughout the course of history are flashpoints that were as unexpected as they were far-reaching. Catastrophic events like the September 11 attacks come immediately to mind, but so too...

Are Connected Cars on a Collision Course with Network Security?
Industry Commentary

Are Connected Cars on a Collision Course with Network Security?

Flipping through any consumer publication that rates vehicles, you'll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel...

Green pen drive
Endpoint Management

'BadUSB' Malware Leaves Terrible Taste at Black Hat 2014

If awards were given out at Black Hat 2014, one nominee for "Exploit of the Conference" would have won in a runaway – the "BadUSB" exploit.

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK