Social networking within a company (Part 1)
I attended a security conference a short time back (http://nuspire.com/CAMPIT.aspx). There were two panel discussions that involved the securing of network data sources while allowing social...
View ArticleSocial networking within a company (Part 2)
The issues around social networking are basically the same as in the past. The general user population wants, even demands that social networking be allowed within and from outside the corporate...
View ArticleData Explosion
Many years ago, MANY years ago, I bought a PC with a 10 Megabyte hard drive. All my friends were envious of me having that tremendous amount of storage. I would joke that I would never use that much...
View ArticleMoore's Law
Many of us have heard of Moore's law or have used the term when discussing the increases in computing power over the last couple of decades. The law was named after Gordon E. Moore, co-founder of...
View ArticlePrivacy on the Web (Part 1)
As a security professional, I have monitored privacy laws for the past decade or so. My interest in these laws started long before that when a friend gave me a book about privacy that was prompted by...
View ArticlePrivacy on the Web (Part 2)
We look at the privacy items in this manner to discuss something many of us have done and will probably do in the future. We have filled out online forms that capture our personal "public" data with...
View ArticleVulnerability Management
Vulnerability management has and is an important aspect of a company's security posture. The managing of vulnerabilities was instituted by IT professionals that were involved by what they...
View ArticleCloud Security: What does it mean? (Part 1)
I have been asked many times in the last few years about my definition of security in the cloud. I find this a question that should be answered with a question. I personally don't like it when I ask...
View ArticleCloud Security: What does it mean? - Part 2
One of the advantages of using SaaS for anti-spam, anti-virus, and anti-spyware blocking is the ability of these services to reduce the amount of traffic into the private network. The reporting of the...
View ArticleLooking back at 2011
This is the time of year that most of us look back at the last twelve months and evaluate what was accomplished. We also look back at things we worked on to improve our internal networks to determine...
View ArticleNuspire speaks to Fox2News Detroit about Target breach
The situation with Target Corporation has captured the attention of many Americans and shows just how vulnerable large chains like Target can be to data theft. Nuspire specializes in protecting large...
View ArticleMSSP Nuspire Networks releases the next generation of the NuSecure Small...
Nuspire Networks, a global leader in enterprise network security services, released its next generation Unified Threat Management (UTM) device for small office, branch office and retail environments....
View ArticleNuspire Networks releases Retail Vulnerabilities Interactive Infographic
Nuspire Networks, a global leader in enterprise network security services, has released an Interactive Infographic which details network security vulnerabilities that retailers need to be aware of and...
View ArticleCybersecurity 101: Defined
Taking cybersecurity threats seriously can be a challenge with all the playful names floating around, but the damage caused can be devastating. Could all of these cyberthreat “nicknames” create...
View ArticleBreaking: Possible credit card data breach at Goodwill locations nationwide
Attention, thrifty shoppers -- financial institutions across the country are tracking what could be a series of credit card breaches involving Goodwill customer data pulled from various store...
View ArticleUnderstanding Managed Security Services
Network monitoring and management service demands have grown steadily as the corporate world moves towards global Internet-based transport architectures, adding to the range, complexity, regulatory...
View ArticleSIEM | Log Management | Event Management
An Enterprise Essential -- Financial institutions, defined as any business that engages in financial activities ranging from insurance brokerage to data processing to automobile financing/leasing, are...
View ArticleMonitoring and Reporting for PCI Compliance
A challenge for many organizations is determining how to best meet PCI requirements across the entire computing environment. Key hurdles that need to be dealth with include risk assessment, auditing...
View ArticleNuspire Supports Twilight Benefit Foundation
Twilight Benefit Foundation Chairman, Saylor Frase, announced that the Twilight Benefit Foundation hosted its eighth annual golf tournament benefiting Cameron’s Crusade and Rachel’s Fundraiser.The golf...
View ArticleJimmy John's Investigating Potential Mega Breach
BREAKING: A pattern of fraudulent transactions involving nationwide sandwich chain Jimmy John’s customer credit card data is being tracked. The company recently released a report stating it is working...
View Article
More Pages to Explore .....