Tag: Technology Internet

Security tips by Dave Malarky, CEO: Time Machine

https://www.youtube.com/watch?v=yOanjvMb8X4 You won’t need a time machine to get out of a ransomware attack, but you will need Sophos. Click HERE to learn more about Sophos’ security solutions!

Security tips by Dave Malarky, CEO: Wi-Fi

https://www.youtube.com/watch?v=K8h4IQqb40Y You don’t need to resort to an air tube system. It’s okay to use Wi-Fi. Sophos will protect you. Click HERE to learn more about Sophos’ security solutions!

Are you wasting money on this common cybersecurity investment?

A wasted investment is the last thing any organization needs, yet the cost of a cybersecurity solution doesn’t necessarily equate to value. Consider Security Information and Event Management, or SIEM tools for example. Dark Reading points out that the tool itself is not the key factor in the effectiveness – it must be properly configured […]

Three Misconceptions of Breaking and Inspecting SSL Traffic [Video]

There are a lot of misconceptions about breaking and inspecting SSL traffic. So much so that some companies elect to go without the ability altogether. In this video, A10 Senior Federal Lead SE James Schweitzer separates fact from fiction when it comes breaking and inspecting encrypted traffic and highlights the benefits of a dedicated decryption […]

AlwaysOn Monitoring with Foglight for SQL Server

We often get asked about the breadth and depth of Foglight when it comes to its monitoring scope. Whether it support for a multitude of relational, open source and NoSQL database platforms or providing the depth needed to identify the root cause of performance issues, you are looking in the right place with Foglight. For […]

Internet Storm Center – SANS Internet Storm Center

An excellent post from the Internet Storm Center about a criminal group using the Fiesta exploit kit (EK) to infect Windows computers. Source: Internet Storm Center – SANS Internet Storm Center  

Network Management Software: WhatsUp Gold v15

Introducing WhatsUp Gold v15: Fast, easy-to-use, secure network management right at your fingertips! Network managers know that problems can happen anywhere: overloaded servers, network traffic bottlenecks, misconfigured devices, out-of-control VM proliferation or layer 2 connectivity issues