Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
21 February, 2019 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
29 January, 2019 | Jeff Melnick

Why Monitoring of Network Devices Is Critical for Network Security

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
22 January, 2019 | Jeff Melnick

Network Security Devices You Need to Know About

Using the proper devices and solutions can help you defend your network. Here are the most common types of network security devices that can help you secure your network against external attacks: Firewall A firewall device is one of the first lines of defense in a network because it isolates one...
15 January, 2019 | Jeff Melnick

Top 10 Best Network Monitoring Tools

If you don’t know the state of your network every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good software solutions, both commercial and open source, for network monitoring. Handpicked related content: [Free...
12 May, 2016 | Alex Vovk

How to Escape Data Tampering Nightmare

Earlier this year Admiral Michael Rogers, head of the NSA and the US Cyber Command, talked about the key 'three things that keep him awake at night' The first two are the fear of online attacks against US critical infrastructure and non-state terrorist groups changing how they use online...
Show more articles