Network Security

My wife was out of the country recently, so I took the opportunity to nudge our house a little further into the 21st century by installing a Nest thermostat. It won’t solve my family’s disagreements about the temperature, but it’s a cool gadget that makes me feel like I’m modernizing a house that was built well into the last century.
FacebookTwitterGoogle+LinkedIn
SonicWall has recently been named the 85th Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) by the MITRE Corporation, an international not-for-profit security institute. What does this mean for SonicWall and the cyber security world at large? SonicWall has a new way to contribute to cyber security education and defense. The purpose of the CVE program is to provide a method and consortium for identifying vulnerabilities in a standardized manner.
FacebookTwitterGoogle+LinkedIn
Network security is often too focused on traditional business. But there are more than 100,000 K12 campuses in the U.S. alone. Each have similar security challenges as the standard enterprise or business, but its users (i.e., most commonly students) require more careful and dedicated protection. Episode 1: An Explanation of E-Rate To help K12 organizations and technology partners better understand opportunities provided by the E-rate program, SonicWall E-rate and cyber security experts explain the history of the program, its importance to K12 organizations, discount levels, and eligible technologies and solutions.
FacebookTwitterGoogle+LinkedIn
SonicWall has spent the last 12 months deeply focused on training and enablement for our partners, customers and employees. Based on student feedback and market requirements, the company’s Education Services Organization is introducing the SonicWall Network Security Administrator (SNSA) course; a completely new training course and certification exam that will replace the Network Security Basic Administration (NSBA) class.
FacebookTwitterGoogle+LinkedIn
The demand for experienced cyber security professionals is at an all-time high. These highly skilled assets are essential in helping businesses protect customers, networks, sensitive data and intellectual property in a fast-moving cyber arms race. But according to a recent ESG study, 51 percent of respondents claimed their organization had a problematic shortage of cyber security skills.
FacebookTwitterGoogle+LinkedIn
Email is vital to business communications and operations. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks. What’s more, government regulations (e.g., PCI, HIPAA, GDPR, etc.) now hold your business accountable for protecting confidential data, ensuring it is not leaked and supporting the secure exchange of email that contains sensitive customer data or confidential information.
FacebookTwitterGoogle+LinkedIn
searching for cybercrime
In preparation for the upcoming publication of the 2018 Annual SonicWall Threat Report, we’re busy reviewing and analyzing data trends identified by SonicWall Capture Labs over the course of 2017. The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from more than 1 million sensors around the world, performs rigorous testing and evaluation, establishes reputation scores for email senders and content, and identifies new threats in real-time.
FacebookTwitterGoogle+LinkedIn
Smart home automation app on mobile
In a casual conversation with my realtor friend, I learned that many upscale tract builders now include home automation to increase margin. We’ve come a long way since the X10 days. Home automation is still a splintered industry. No end-to-end solutions exist. There are, of course, the commercial integrators targeting custom estates with project cost measured in the percentage of home values.
FacebookTwitterGoogle+LinkedIn
When you look at the most damaging network security invasions over the last year, you see a recurring pattern: leaked government cyber tools being repurposed by cybercriminals. The compromised NSA toolset leaked by Shadow Brokers was devastating in many respects. These were highly targeted tools that many nation states wish they had the operational capacity to deploy.
FacebookTwitterGoogle+LinkedIn