SecBI has fielded new software that aims to eliminate the burden of processing billions of traffic logs per month manually, and they did it without using any network taps. Come to CSO Magazine to find out how SecBI solved this tricky problem…
CSO Magazine is turning up the heat on cybersecurity, diving into reviews of the latest cyber defenses in critical categories as part of a summer reviews blitz. Find out how the latest products in deception, microsegmentation, network traffic analysis and others stack…
A new type of environmentally aware malware knows how to look for key indicators to prove that its running inside a sandbox. The Minerva tool we tested for CSO Magazine actually feeds it those prompts, tricking the malware to sleep or kill…
We tested the Netgear ReadyNAS 314 for BizTech, finding a sturdy workhorse for file storage, that also automatically squashed bugs before they could be permanently written.
New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. Network World asked TWB author John Breeden II to test out several manager programs…
What if there was a different way to look at security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? Varmour does that. It’s called segmentation, and is…
What if you assumed that APTs were already hiding in your network and launched software specifically designed to hunt them down? Network World reviewed the latest tools in the cybersecurity arsenal: threat hunting platforms. Load up some extra ammo, because we are…
The SafeBreach continuous security validation platform simulates how specific networks are vulnerable to attack, and how to plug what is likely quite a few holes in existing defenses. Read the Network World testing and review.
Few technologies are more vital to the bottom line of a modern business than document automation. Document automation’s universal application, speed of accessibility and ease of use can make or break a company of any size. It can mean the difference in…
You may have a missing component in your defenses if you are not protecting your proprietary data. Either by malicious effort or accidental incompetence, users can send customer, financial, secret or sensitive information out of your network via almost unlimited channels. Network World…