7 Things That Make Every Website Safer for Customers

7 Things That Make Every Website Safer for Customers

Your website needs to be well-designed, functional, and aesthetically reflective of your brand. But — don’t forget—it also needs to be safe. Website security is a vital path of development that makes your data less vulnerable to cybercriminals, and increases the security of your customers’ financial transactions. You’ll also prevent the possibility of a massive [...]

Is Your Industry at High Risk of Insider Threat?

Is Your Industry at High Risk of Insider Threat?

In the movies, data theft is usually the work of outsiders. You’ve witnessed the scene a million times: A cyber thief breaks into a business, avoiding security measures, dodging guards and employees, and making off with a USB stick of valuable data seconds before he or she would have been spotted. But in the real [...]

The Rise in SSL-based Threats

The Rise in SSL-based Threats

Overview The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud, more than half of the traffic that inspected uses SSL. It is no surprise, then, that malicious actors have [...]

Moving to a Culture of Trust in Digital Transformation – Perspectives from the Healthcare Industry

Moving to a Culture of Trust in Digital Transformation – Perspectives from the Healthcare Industry

The move to a paperless system to improve health and social care is an ambition central to many governments around the world. (ISC)² recently held a roundtable event in London, United Kingdom (UK) inviting several people who work within the sector and the country’s National Public Health Service (NHS) to explore a range of current [...]

PAN-OS 8.0: Three New Features in Panorama That Will Make Your Job Easier

PAN-OS 8.0: Three New Features in Panorama That Will Make Your Job Easier

Network security management tools should make your life easier. Panorama network security management is intelligent, fast, and plugs into your security ecosystem via application programming interfaces (APIs). It does the heavy lifting of correlating indicators of compromise across millions of log lines obtained from next-generation firewalls and endpoints; takes automated actions that you have pre-programmed; [...]