Skip to content

The Best Way To Optimize Load Balancing for Inline Security Appliances

In today’s 24×7, “always on” world, the company’s data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only

What is hidden in encrypted internet traffic streams

​Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed

How to Optimize Your Security Defenses

​As I mentioned in a blog a couple of months ago, there is an absolute myriad of security architectures and techniques available to the enterprise

Deploying Inline Security Tools

Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go

Network Security Works Only If You See The Right Traffic

Security is nowadays an important part of network management. Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall

How to Detect if a Rootkit Compromised Your System

​The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security