Firewalls

Burning down the house: CEO attitudes to cyber security all wrong

Security In Depth has just published the results of research which found 83 per cent of Australian companies have no policies or plan in place for a data breach and 41 per cent said they “did not understand” what an ICT security framework was.

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

Juniper Networks accelerates firewall performance for Cloud, 5G, IoT

Juniper’s new service processing card for SRX5000 line of firewalls significantly increases performance, scale and extensibility.

Partner Content
Unified Threat Management: A Modern Solution to a Modern Problem

The traditional ways of securing applications and infrastructure involved the use of firewalls and protection mechanisms for different kinds of threats, through discrete functions. UTM changes all that, by employing a single appliance that performs various security functions. This whitepaper examines how to implement a UTM solution effectively.

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

The top 5 cyber security jobs with growing demand in India

The need for experienced professionals is so high that companies are willing to pay a premium salary of over Rs 1.5 to 4 crore to top talent. This has increased the cyber security budget by 71% as per PwC.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Pragnesh Mistry

For RPG Group, Pragnesh Mistry setup an ISO 27001 framework based on which the availability of business-critical data to authorized users, communication link availability, and necessary controls were built through single service provider.