Get the side-by-side comparison of industry's leading Enterprise PBX solutions and vendors. Our Focus product specialists evaluated big players, like Cisco Systems and ShoreTel, across 30 feature categories.
The enterprise (medium to large-sized business) market is getting more and more attention from...
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
The National Institute of Standards and Technology said Friday it's taking seriously recent reports of vulnerabilities to NIST-validated USB flash drives, and is in the process of reviewing the information on the vulnerability.
Government agencies must protect highly sensitive data and critical network infrastructure from a constant barrage of security threats. A single security breach can cost millions of dollars in damages and lawsuits, as well as have an intangible but very costly impact to the agency's reputation. Furthermore, government...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
Citizens have a heightened expectation of privacy when they interact with the government online, says Heather West, a CDT policy analyst with the advocacy group Center for Democracy and Technology.
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Knowing what changes have been made to your IT infrastructure is vital, particularly when they are unauthorized. Identifying any suspicious events is also paramount.
Read this white paper to learn more about an all-in-one log and event management solution that provides real-time visibility into all threatening...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.