informa

Partner Perspectives

An Industry In Transition: Key Tech Trends In 2018
An Industry In Transition: Key Tech Trends In 2018
May 29, 2018
An Industry In Transition: Key Tech Trends In 2018
by Shehzad Merchant, Chief Technology Officer, Gigamon
May 29, 2018
5 min read
Article
Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into...
May 21, 2018
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into...
by Jack Hamm, Sr. Manager, Security Operations, Gigamon
May 21, 2018
5 min read
Article
Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe n...
May 17, 2018
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe n...
by Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
May 17, 2018
5 min read
Article
Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE–2017–7269 vuln on an operating system that w...
May 10, 2018
New campaign shows that there are still systems exposed to the year-old CVE–2017–7269 vuln on an operating system that w...
by Andrey Shalnev, F5 Security Researcher
May 10, 2018
5 min read
Article
Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthre...
May 08, 2018
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthre...
by Graham Melville, Senior Director, Solutions Marketing, Gigamon
May 08, 2018
2 min read
Article
4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting ...
May 03, 2018
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting ...
by Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
May 03, 2018
5 min read
Article
3 Ways to Maximize Security and Minimize Business Challenges
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tole...
April 30, 2018
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tole...
by Jack Hamm, Sr. Manager, Security Operations, Gigamon
April 30, 2018
5 min read
Article
Europe and Asia Take on More DDoS Attacks
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inc...
April 26, 2018
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inc...
by Sara Boddy, Principal Threat Research Evangelist
April 26, 2018
5 min read
Article
Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, acco...
April 25, 2018
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, acco...
by Paul Martini, The CEO, co-founder and chief architect of iboss
April 25, 2018
3 min read
Article
IDS & IPS: Two Essential Security Measures
To protect business networks, one line of security isn't enough.
April 23, 2018
To protect business networks, one line of security isn't enough.
by Diana Shtil, Senior Manager, Product Marketing, Gigamon
April 23, 2018
6 min read
Article
Researchers Discover Second rTorrent Vulnerability Campaign
This time attackers appears to have spoofed the Recording Industry Association of America (RIAA) and New York University...
April 19, 2018
This time attackers appears to have spoofed the Recording Industry Association of America (RIAA) and New York University...
by Andrey Shalnev, F5 Security Researcher
April 19, 2018
5 min read
Article
How to Leverage Artificial Intelligence for Cybersecurity
AI and predictive analytics should be used to augment a company’s security team, not replace it. Here's why.
April 18, 2018
AI and predictive analytics should be used to augment a company’s security team, not replace it. Here's why.
by Joe Cosmano, Senior Vice President of Engineering Services, iboss
April 18, 2018
3 min read
Article
How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to ex...
April 12, 2018
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to ex...
by Andrey Shalnev, F5 Security Researcher
April 12, 2018
5 min read
Article
Avoiding the Ransomware Mistakes that Crippled Atlanta
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, w...
April 12, 2018
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, w...
by Chris Park, Chris Park, CIO, iboss
April 12, 2018
4 min read
Article
Cryptomining: Fast-Becoming the Web's Most Profitable Attack Method
The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for...
April 05, 2018
The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for...
by Travis Kreikemeier, F5 Systems Engineer
April 05, 2018
4 min read
Article