Select Page
7 Research Insights to Help Inform Your Approach to Network Security

7 Research Insights to Help Inform Your Approach to Network Security

When thinking about network security today you need to think beyond “network.” Most organizations manage a multitude of cloud services – sometimes essential to the organization and often part of shadow IT use cases. In a recently commissioned white paper from Osterman...
FBI Alerts that 2FA is Bypassed by Phishing Attacks

FBI Alerts that 2FA is Bypassed by Phishing Attacks

The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to two new hacker tools that can bypass two-factor authentication. A Dark Reading article shared that the PIN noted threat actors are using “well-known techniques including social...
How URL Filtering Fails Users (and What You Should Do)

How URL Filtering Fails Users (and What You Should Do)

URL filtering is a feature of most Next-Generation Firewalls (NGFW) and some Web Proxies. It compares web traffic against a URL filtering database to block employees from reaching malicious phishing sites and potentially other undesirable Internet locations such as...
The Finish Line for DerbyCon is the Starting Line for SlashNext

The Finish Line for DerbyCon is the Starting Line for SlashNext

DerbyCon 9.0 takes place next week, September 4-8 at the Marriott Louisville in Kentucky. It will be the ninth and final iteration for the conference that started as an idea kicked around by four friends in the security industry at a pizza parlor years ago. The event...