Next Generation Firewalls May Not Stop Malware
Best Defense Against Malicious Encrypted Traffic Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, it is predicted that as much as 70% of cyberattacks will use encryption as part of their delivery mechanism by 2019. Meanwhile, the use of encryption is growing rapidly.… (0 comment)

Are you wasting money on this common cybersecurity investment?
A wasted investment is the last thing any organization needs, yet the cost of a cybersecurity solution doesn’t necessarily equate to value. Consider Security Information and Event Management, or SIEM tools for example. Dark Reading points out that the tool itself is not the key factor in the effectiveness – it must be properly configured… (0 comment)