Posts tagged with VPN

Industry Commentary · IT policy · Mobile · VPN

The Workplace of the Future and What It Means for Network Security

The convergent trends of BYOD, the consumerization of IT and mobility are causing rapid shifts in employees’ expectations for their work environment. Employees are driving the change by working...

Encryption · Industry Commentary · VPN

Target and Neiman Marcus Hacks: The Network Security Lesson to Learn

Even if you’re not one of the tens of millions of customers that have had your credit card data stolen and sold on the black market, you’ve almost certainly heard about the Target hack that occurred...

Cloud · Industry Commentary · Rethink Remote Access · VPN

The Internet of Vulnerable Things: Why Remote Access Security is Critical

A new worm that targets embedded devices started to spread during the holiday season. The Zollard worm, which targets various devices running on Linux, has brought to light the numerous security...

Encryption · Industry Commentary · Rethink Remote Access · VPN

New Study Reiterates the Dangers of Advanced Persistent Threats for Network Security

When we last spoke about advanced persistent threats (APTs), the New York Times had just fallen victim to an attack that used malware to create new network patterns that allowed it to remain...

Industry Commentary · IT policy · Mobile · VPN

Network Security: IT Professionals’ Top Priority for 2014

Chances are if you’re reading this blog, you understand how vital it is for enterprises today to secure remote access to their corporate networks. It looks like that understanding is becoming more...

Encryption · Industry Commentary · VPN

Encryption: The Key to Network Security

In the network security industry, we see firsthand how encryption prevents a wide range of security breaches, protects corporate networks and safeguards sensitive, personal information and...

Certificates · Industry Commentary · IPsec · Mobile · VPN

The Security Risks of Remote Support Tools

A recent study has come to light which shows that although remote support tools are being increasingly implemented within enterprises, IT decision-makers are uncertain about their safety. They should...

Endpoint Management · IPsec · IT policy · VPN

Developing a Comprehensive Remote Access Security Framework: Network Health and Trust

The need for a comprehensive remote access security framework cannot be emphasized enough. Those looking for proof of this concept need look no further than the recent Adobe hacking, and the chilling...

Industry Commentary · VPN

Vehicle VPNs, Part One: The ‘Connected Car’

The “connected car.” Up until this point, such a phrase never really resonated with people the way it does now. Most would think it referred to environmentally-focused electric cars that you recharge...

Industry Commentary · IT policy · VPN

Adobe Hacked: The Frightening Implications for Network Security

It seems barely more than a few weeks can pass without news of a major global company being targeted by cyber criminals. The latest to find a bullseye on its back is Adobe. The software company —...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK