Who’s Watching Me? Tips to Protect Your Privacy in the Digital World

Internet-Privacy

Internet-PrivacyOver the past couple years we’ve seen digital privacy take the world by storm. Recent revelations about government snooping, data breaches releasing personal information, mobile apps tracking your every move, social media sites exposing your personal life for their gain, etc. shows why digital privacy has become such a huge concern for anyone utilizing the internet today.

Read more on Who’s Watching Me? Tips to Protect Your Privacy in the Digital World…

Network Security in Hybrid Cloud Environments: Separating the Myths from the Facts

shutterstock_176956397_V2

shutterstock_176956397_V2As we found out in our recent survey, network security and data security are the two most challenging security functions to migrate to cloud environments. Specifically, the problems highlighted in survey respondents include:

Read more on Network Security in Hybrid Cloud Environments: Separating the Myths from the Facts…

Where Were You Born?

brucespringsteenpicture-jpg

brucespringsteenpicture-jpgExciting news from AlgoSec this week: we announced our solution for unified security policy management across hybrid cloud infrastructure. This is a key component of our “managing security at the speed of business” vision and supports our mission to automate security policy management in evolving data centers and networks.

Read more on Where Were You Born?…

Why VLANs May Not Be Providing the Security You Need

vlans

vlansYou’re in no doubt familiar with Virtual Local Area Network (VLAN) technology and its ability to segment traffic within your network. It’s one of those decades-old technologies that businesses have come to rely on to reduce costs, minimize network broadcast domains, and protect certain systems from others. It sounds good on paper but it’s rare to see a VLAN environment that’s truly configured in the right way in order to realize its intended benefits.

Read more on Why VLANs May Not Be Providing the Security You Need…

Network Security Tip of the Week

tip-of-the-week1

tip-of-the-week1Continuing our recent focus on network segmentation, this week's network security tip comes from Charles Riordan, Managing Consultant at Check Point:

“Build and deploy “for-purpose” specific security gateways based on a security zones approach, taking in zones’ access of greater trust the deeper one gets into the architecture. Look for and implement monitoring of these gateways from a security/compliance posture (status) in a 24×7 paradigm with alerting and reporting capabilities. Only deploy specific functional protections – thus eliminating over-use of resources, etc…”

Read more on Network Security Tip of the Week…