Adding Embedded DPI to Next-Generation Firewalls

NONE |

article image
A leader in deep packet inspection technology, Procera Networks delivers real-time application classification solutions to enterprise gateway and telecommunications vendors globally. 443 Networks needed to increase the level of visibility into web application traffic its security platform offered. By adding Procera's NAVL to their existing solution, 443 Networks gained the level of web application visibility that had previously been lacking from its solution, including application identification of encrypted traffic. 443 Networks can now offer a solution that allows IT managers to make decisions about how end users should and shouldn't use web applications on a case-by-case basis.

Spotlight

NSHC

As one of the leading cybersecurity company of South Korea, NSHC is now the no.1 mobile security solution provider in Far East Asia, no.1 ICS/SCADA Offensive Security Service Provider in the whole of Asia, and striving further to be the top cybersecurity company in the world.

OTHER ARTICLES

Coronavirus and the Cybersecurity Threat Landscape

Article | March 4, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will hit every organization, no matter how resilient they thought they were. No single event to date has changed the tech threat landscape more than the consequences and impacts developing around the Coronavirus (aka SARS-CoV-2 and the disease CoViD-19). Then there are the business consequences, such as the sudden changes in consumer patterns and steep loss of income. The coronavirus is unmistakably a black swan event. It falls outside of the outliers. It creates a situation that many security professionals are familiar with: The Medusa Effect.

Read More

The Coronavirus is Already Taking Effect on Cyber Security– This is How CISOs Should Prepare

Article | March 4, 2020

Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. The Coronavirus is hitting hard on the world’s economy, creating a high volume of uncertainty within organizations. Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution (learn more here) to protect employees that are working from home with their personal computers, because of the coronavirus. Cynet identifies two main trends – attacks that aim to steal remote user credentials, and weaponized email attacks:

Read More

New Cyber Threat Index Shows Industries Are Under Attack in Uncertain Times

Article | March 4, 2020

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes in traffic and attack trends across multiple industries and countries. This month’s edition looks at how COVID-19 is affecting all industries across the globe. Our researchers have found that while some sectors are experiencing a dip in the number of attacks, on the whole they remain consistent. As the chart below shows, certain sectors have experienced a significant increase in attacks over the past few months: attacks on gaming are up seven percent, food & beverages are up six percent, and financial services are up 3 percent.

Read More

What You Need to Know About the Cybersecurity Solarium Commission Report

Article | March 4, 2020

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response before a major cyber incident occurs, not after. Unlike the original Solarium Commission, which operated in a classified environment, the Cybersecurity Solarium Commission chose to release its report publicly out of recognition that cybersecurity involves everyone. “In studying this issue,” begins the letter from Sen. Angus King and Rep. Mike Gallagher, the chairmen of the commission, “it is easy to descend into a morass of classification, acronyms, jargon, and obscure government organization charts. To avoid that, we tried something different: an unclassified report that we hope will be found readable by the very people who are affected by the very people who are affected by cyber insecurity – everyone. This report is also aimed squarely at action; it has numerous recommendations addressing organizational, policy, and technical issues, and we included an appendix with draft bills that Congress can rapidly act upon to put these ideas into practice and make America more secure.”

Read More

Spotlight

NSHC

As one of the leading cybersecurity company of South Korea, NSHC is now the no.1 mobile security solution provider in Far East Asia, no.1 ICS/SCADA Offensive Security Service Provider in the whole of Asia, and striving further to be the top cybersecurity company in the world.

Events