Securing your network and application infrastructure Part 3: Staying ahead of hackers

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Fortinet’s Cyber Security platform can address most of the problems outlined in the essays in this e-book. Our ASIC-powered FortiGate...

December 18th, 2015 IT World Canada Team

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

For all the attention data security has received in recent years and all the technical advances in risk detection now...

December 18th, 2015 IT World Canada Team

data, network, database

Six steps to improve network visibility

Early 20th century legendary baseball pitcher Walter Johnson once said, "You can't hit what you can't see." It's the same...

December 9th, 2015 Howard Solomon

Next-generation IPS and firewall

Next-generation IPS and firewall

Firewalls are best at controlling access to the network from outside. They are the security guard at the gate who...

November 26th, 2015 IT World Canada Team

security and privacy issues

Cisco router exploit confirmed by security vendor

CISOs with Cisco routers in their infrastructure have been warned to be on the lookout for attacks after a security...

September 16th, 2015 Howard Solomon

DDoS Attack Brick Wall

Warning to CISOs: Old routers could be aiding DDoS attacks

Most CISOs understand the security problems with old network equipment. A new report this week from Akamai Technologies' security and...

July 2nd, 2015 Howard Solomon

Networking 1

Cisco expands network security to endpoints and the cloud

Cisco Systems is broadening its network security coverage by expanding the intrusion detection and prevention technology it gained through an...

June 8th, 2015 Howard Solomon

Image from  Shutterstock.com (c) Maksim Kabakou

IT security industry partly to blame for successful attacks, says vendor

An official of an IT security vendor admits the industry still isn't doing a good enough job of meeting the...

April 8th, 2015 Howard Solomon

71080359

Eight per cent of your partners may be a high security risk: Study

One of the weakest links in an organization's IT security may be the most obvious: The telecom provider. That's one...

March 31st, 2015 Howard Solomon