Ten tips for more secure sofware

How to secure remote management software

Remote management software is a boon to infosec pros, for it allows them to access to servers and access employee desktops...

January 11th, 2017 Howard Solomon

Consider microsegmentation for increased security

Cyber security experts have been urging infosec pros for years to segment their networks to better protect corporate data. Microsegmentation...

January 5th, 2017 Howard Solomon

Mobile Security

Carriers, privacy advocates should work closely on new mobile protocols: Report

Everybody loves video on mobile devices -- users love it because it's entertaining and informative, carrier executives love it because...

October 25th, 2016 Howard Solomon

The blind state of rising SSL/TLS traffic: are your cyber threats visible?

The blind state of rising SSL/TLS traffic: are your cyber threats visible?

Security solutions designed to monitor network traffic to detect threats and prevent data leakage are becoming less effective as a...

August 11th, 2016 IT World Canada Team

The Real World Challenges of Integrating Next Generation Technology

The Real World Challenges of Integrating Next Generation Technology

Companies intending to not only meet the needs of today but be prepared for future growth must integrate and understand...

August 10th, 2016 IT World Canada Team

Tips for unmasking network attackers

No one wants to join the growing list of companies that have announced they’ve been hacked and suffered a data...

July 7th, 2016 Yogi Schulz

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Fortinet’s Cyber Security platform can address most of the problems outlined in the essays in this e-book. Our ASIC-powered FortiGate...

December 18th, 2015 IT World Canada Team

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

For all the attention data security has received in recent years and all the technical advances in risk detection now...

December 18th, 2015 IT World Canada Team

data, network, database

Six steps to improve network visibility

Early 20th century legendary baseball pitcher Walter Johnson once said, "You can't hit what you can't see." It's the same...

December 9th, 2015 Howard Solomon