< Back
Security : Firewall : Policy Management : Service Level Agreements
Back to Basics
The last few months have been a cold shower for most of us as we’ve suddenly woken up to the reality that life as we know it can be so uncertain. Information Technology like every other part of an organization is today faced with the challenge of delivering more for less.
Calum MacLeod
Director of Sales, Benelux
Tufin Technologies

read more >

Security : Cloud
> Compliance Pros Need to Beware of Mobile Data Risks
> Every Cloud has a Silver Perimeter
> Mobile Exposure: Do you know where your data is?
> If Your Head’s In the Cloud, Keep Your Feet on the Ground!
Security : Configuration Management
> Are Your Endpoints Compromising Compliance?
> 100% Proof: Compliance Matters for Security
Security : Control Framework
> Security Breaches Highlight the Need to Improve Network Segmentation Efforts
> Are You Missing Inter-Application Controls?
Security : Cyber Attacks
> National ESIGN Day
> The Cyber Silent Killer
Security : Data Breach
> Business Continuity – You Need More Than Just a Plan
> Is P2P Changing How You Prepare For A Security Audit?
> How to Implement Secure, PCI Compliant Access Controls
Security : File Lifecycle Management
> Secure File Transfer Protects Data In Motion
Security : Firewall
> Firewall Management: IPv6 and You
> Firewall Expert Tip: The Lifecycle of a Firewall Rule
> If IT is Down the Heat is Up
> A Good Samaritan
> Lingerie and IT
> When Words Fail...Automate!
> Firewall Management Today and Tomorrow
Security : HIPPA
> Effective Internal Wireless Security for Healthcare in the Age of BYOD
Security : Identity Theft
> Special Challenges Facing Government Agencies as They Work to Combat Insider IT Security Threats
Security : Internal Fraud
> What Went Wrong at Société Générale?
Security : Patches
> Less-Than-Zero vs. Zero-Day
> Differentiating Between Higher-Risk Systems and Higher-Risk Compliance
Security : Technology
> Free Can Make You Bleed
> SQL Threats Require a New Approach to Core Network Security
> Beyond Detection: Managing Your Response to Advanced Malware
> Understanding and Preventing Modern DDoS Attacks
> "Rich List" Data Leak Shows Information More Valuable Than Gold
> Biggest DDOS Attack in History Could Have Been Avoided, or Not
> AccelOps Cloud Security Survey 2013
> Is DNA Personally Identifiable Information?
> Cyber Threats: Looking Both Ways
> The Pros and Cons of Security Appliances
  More Technology...

About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY