Creepy Creatures on Your Network: Chilling Security Breaches and How to Protect Against Them

scary

scaryIt’s that time again, when the ghouls of cyber security come out to haunt you – and trust me there are plenty of them this year! Here are a few particularly gruesome attacks, which are sure to curdle your blood.

Read more on Creepy Creatures on Your Network: Chilling Security Breaches and How to Protect Against Them…

Why You Should Write Down Your Passwords

pasword

paswordFollowing on from last week’s recommendations from Matt Pasucci on how to protect your privacy in the digital world, I’d like to add my own tips on user name and password management.

Read more on Why You Should Write Down Your Passwords…

Bashing Bash with Network Segmentation

HiRes

HiResIn September, a critical bug in the open source Bourne-Again Shell (BASH) that’s ubiquitous in Unix-based systems, including Linux and Mac OS X, displaced Heartbleed as the top network security threat. Called Shellshock, the bug allows hackers to insert code into the shell and hijack an operating system through the internet. From there, they can access sensitive information—unless a strong defense is in place.

Read more on Bashing Bash with Network Segmentation…

Who’s Watching Me? Tips to Protect Your Privacy in the Digital World

Internet-Privacy

Internet-PrivacyOver the past couple years we’ve seen digital privacy take the world by storm. Recent revelations about government snooping, data breaches releasing personal information, mobile apps tracking your every move, social media sites exposing your personal life for their gain, etc. shows why digital privacy has become such a huge concern for anyone utilizing the internet today.

Read more on Who’s Watching Me? Tips to Protect Your Privacy in the Digital World…

Network Security in Hybrid Cloud Environments: Separating the Myths from the Facts

shutterstock_176956397_V2

shutterstock_176956397_V2As we found out in our recent survey, network security and data security are the two most challenging security functions to migrate to cloud environments. Specifically, the problems highlighted in survey respondents include:

Read more on Network Security in Hybrid Cloud Environments: Separating the Myths from the Facts…

Where Were You Born?

brucespringsteenpicture-jpg

brucespringsteenpicture-jpgExciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed of business” vision and supports our mission to automate security policy management in evolving data centers and networks.

Read more on Where Were You Born?…