Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

Cloud Security vs. Network Security: Which is Best for your SME?

Being in cybersecurity line of business and being aware of the issues faced by multiple small to mid-sized businesses, we often come across various jargon which may be unclear to some. One of the most common questions for SMEs is should they focus on cloud security or network security. It is hard for SMEs to prioritise their security budget and find affordability with security. To make an informed decision, it’s important to understand the options.

Forward Fix: Use Case for Network Query Engine Library

Technical Solutions Architect, Kevin Kuhls demonstrates a use case for Forward Enterprise's Network Query Engine (NQE) Library. Watch as he finds all BGP neighborships that are not in the established state without tediously logging into each router or writing complex scripting. Across all vendors and locations, Forward Enterprise models all the devices and NQE allows you to grab the data you want.

What is an Open Port? Port Scanning, Risks and Monitoring.

Port scanning is the critical element of any cyber risk assessment conducted under infrastructure security or network security domains. It helps to identify all the exposed services on a system or network. Presence of open ports doesn’t indicates importance from attack perspective only; they are equally vital from a defensive front.

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security have grown more and more sophisticated. This post will take us back in time to look at the journey that a typical network has been on over the past 15+ years. From a wide open, “chewy” network, all the way to zero trust networking. Let’s get started.

Network, Endpoint, and Cloud DLP: A Quick Guide

At the beginning of 2019, 60% of companies responding to the Insider Threat Report survey reported that they were planning to implement a data loss prevention (DLP) solution. For a few years, organizations have been aware that they need to add data loss prevention (DLP) tools and software to their technology stack in order to safeguard sensitive information collected and stored` However, there’s a common misconception that DLP is just one “thing”.

What is a software-defined perimeter and how does SDP work?

A software defined perimeter (SDP) establishes virtual boundaries around Internet-connected assets and user activity through an integrated security architecture approach. SDP works regardless of whether assets reside on-premises or in the cloud, or whether users are on-site or working remote. Rather than relying on hardware like firewalls or VPNs at the network boundary, SDP leverages software to prevent any access to or even visibility into resources within the virtual perimeter by default.