This article originally appeared in the April 2020 issue of Security Business magazine. When sharing, don’t forget to mention @SecBusinessMag! Network segmentation is the security integrator’s first ...
As part of a robust cybersecurity strategy, organizations often turn to network segregation to help limit the damage caused by a successful cyberattack and protect sensitive data. Dividing a network ...
RSA and VMware have released five best practices for locking down virtual environments and meeting compliance requirements. The steps comprise platform-hardening, configuration and change management, ...
For all the advances of AI that machine learning brings to productivity and decision-making, it has a major downside: cybersecurity risks. Businesses often underestimate the security risks of adopting ...
Intelligent physical security system devices—especially AI-enabled video cameras—have become high-value targets for hackers, who now deploy malware explicitly designed to infect these devices and lie ...
One of the most buzzworthy terms in cybersecurity right now is the high-concept, somewhat cryptic construct called zero trust. In a nutshell, it’s designed to strengthen and tighten cybersecurity ...
VLAN segmentation is more than just neat organization—it’s a cornerstone of modern network security. By isolating traffic into logical groups and enforcing access controls, you can limit threats and ...
Fast-propagating attacks like worms or viruses can quickly bring a data center to its knees. But protecting the data center from such threats is not as simple as erecting a perimeter around the ...
Good network segmentation is a highly recommended network security practice that requires a firewall policy known as an allow-list or whitelist. How should you go about implementing it? What is ...
The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years. The average number of attacks per country among surveyed organizations rose from an average of 43 in ...