
Do We Need Our Own SOC?
A SOC is the focal point of an organization’s security operations and network defense. But SOCs vary in maturity levels and capabilities. Try our online worksheet to discover the type of SOC your team needs.
ABOUT THE AUTHOR
A SOC is the focal point of an organization’s security operations and network defense. But SOCs vary in maturity levels and capabilities. Try our online worksheet to discover the type of SOC your team needs.
When it comes to managed firewalls, there’s more to consider than just CapEx and OpEx. Here are three important questions your team needs to ask before you make the move.
Cybercriminals commonly hide threats inside of encrypted traffic in order to evade security controls. Here’s how your firewall can combat the blind spot created by SSL.
Find out how your organization can mitigate risks and respond to the SolarWinds Hack in this guide from leading cybersecurity experts.
With work/learn-from-home growing, IT staff in education face unique challenges in securing connectivity for students and faculty in their homes. In this blog post, John Headley highlights two other special concerns for IT and cybersecurity in education and his recommendations.
This major security flaw could impact nearly 200,000 currently-deployed FortiGate firewalls. Learn how to check for this vulnerability and how to resolve it.
You want to take advantage of the flexibility of a multi-cloud or hybrid cloud environment. Don’t get blindsided by configuration complexities and unpredictable network performance. Here’s how.
From email security to zero trust network access, John Headley recommends 10 tools to defend against ransomware.
EDR stands for Endpoint Detection & Response. Learn how EDR goes beyond what is offered by standard endpoint protection platform (EPP), i.e. traditional antivirus products.
Two of the most popular options for setting up a remote workspace are VPN and VDI. It’s important to know the differences between each option in order to select the right fit for your business.