Best Practices for Cyber Risk Management in the Digital Age

In the digital age, functional leaders within an organization must be proactive in their approach to cybersecurity. Join us on November 19, 2015 at 2:00 p.m. EST for a discussion on how you and your organization can prepare, implement, and respond to cyber threats. Discussion Topics Planning for Prevention: Setting a New Tone for Cybersecurity […]

Continue Reading

Palo Alto Networks Researcher Discovers Critical Vulnerabilities in Internet Explorer and Microsoft Edge

Palo Alto Networks researcher Bo Qu was credited with discovery of six new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 and Microsoft Edge. These vulnerabilities are covered in Microsoft’s November 2015 Security Bulletin and documented in Microsoft Security Bulletins MS15-112 and MS15-113. In our continuing commitment to the security […]

Continue Reading

Configuration and Change Management in Network Security – Ensuring the Left Hand Knows What the Right Hand Is Doing

Multiple security deployments, distributed networks, and several administrators – these are just some of the causes that make it increasingly tough to stay on top of effective security policies, compliance and streamlined management of your network security. Changes in one part of your network may negatively impact the effectiveness of your security in another part, […]

Continue Reading
%d bloggers like this: