A New Approach to Securing the Enterprise Network today!

With disclosure of yet another high profile data breach happening with alarming regularity, what can an enterprise do to protect itself?

Sandstorm comes to Sophos Email Appliance: The next-gen sandboxing that stops targeted attacks

With 95% of targeted attacks beginning with an email, your secure email gateway is vitally important as your first line of defense. Attackers are more frequently using previously-unknown malware to evade traditional protection. While conventional anti-malware protection is still essential ...

Sophos Home reviews: “Simple,” “amazing” and “awesome”

Sophos Home, our free security solution for the whole family, has been available for a few months now, and the response has been overwhelmingly positive. The home IT heroes and professional sysadmins who've tried Sophos Home have been "very impressed," ...

Fortinet Helps Healthcare Organizations Deliver Security Without Compromise and Protect Sensitive Patient Data

Barnabas Health is New Jersey's largest integrated healthcare delivery system, with 7 hospitals, including two children's hospitals, 95 physician medical groups, an ambulatory care center, a statewide behavioral health network, Read ...

Security threat: Hackers hold hospital data hostage

Hospitals need to be vigilant with their cybersecurity so they can protect themselves against outside attacks from hackers. And it could cost them more than just fines for data breaches - ...

Analysis of CVE-2016-0059 - Microsoft IE Information Disclosure Vulnerability Discovered by Fortinet

Summary This month Microsoft patched two vulnerabilities which were discovered and reported by me, one is an information disclosure vulnerability in Internet Explorer (IE) (CVE-2016-0059 in MS16-009), the other is a ...

Reducing Data Center Risk Through Strategic Infrastructure and Maintenance Decisions

Learn about the processes that govern best practices for cleaning, airflow, flooring and asset tracking to assist in the security and longevity of IT physical assets Read More Read More...

Haystacks and Needles: IoT Security through "Pico"-Segmentation

Over the past year or so we've heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres... but is it enough? ...

Internal Segmentation Firewalls--Securing the Inner Network

Our threat landscape is constantly evolving. As known vectors are exposed and neutralized, new methods emerge to take their places. And the current wave of advanced threats are getting increasingly better ...

Fixing the Internet's routing security is urgent and requires collaboration

The Internet is fragile. Many of its protocols were designed at a time when the goal was rapid network expansion based on trust among operators. Today, the Internet's open nature is ...