Skip to content

Continuously Validate Your Cyber Defenses

Even with advanced firewall technology, intrusion prevention systems (IPS), and a wide array of security tools in place, businesses still miss clues and suffer major

Viavi’s 13th Annual State of the Network

Viavi’s 2020 State of the Network Study results are in. Over 400 IT professionals from around the world, across business size and verticals, completed the

How to Implement Security Monitoring For Critical Infrastructure

​I ran across an interesting statistic a couple weeks ago. According to a Ponemon Institute, report titled “The State of Cybersecurity in the Oil &

Ixia – Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and

Orolia Case Study – Banking on BroadShield

​Why This Case Study is Relevant It demonstrates the importance of installing anti-jam and anti-spoofing software. Background  ​A major international financial services provider was experiencing

The Best Way To Optimize Load Balancing for Inline Security Appliances

In today’s 24×7, “always on” world, the company’s data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only

What is hidden in encrypted internet traffic streams

​Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed