Things to Consider Before Implementing Advanced Network Security
Today’s networked world is constantly shifting, and the number and type of devices it connects changes minute by minute. The combination of in-house computing, cloud-based resources and a mobile...
View ArticleFocusing on the Fundamentals of Network Security
IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020. Focus on Security Fundamentals One of the key...
View ArticleNetwork Segmentation Series: What is It?
This is the first in a series of three blog posts about network segmentation. Many businesses are looking to augment their defenses by changing their approach to network security. Take the heightened...
View ArticleThe OSI Model and You Part 1: Stopping Threats on the OSI Physical Layer
The Open Systems Interconnection (OSI) model is one of the many useful tools we can use to stop cybersecurity threats. This long-standing standard separates a network into seven layers, offering...
View ArticleThe OSI Model and You Part 3: Stopping Threats at the OSI Network Layer
Networking models help us understand the ‘lay of the land’ when it comes to protecting the network. In our journey through the Open Systems Interconnection (OSI) framework, we’ve arrived at the last...
View ArticleThe OSI Model and You Part 4: Stopping Threats at the OSI Transport Layer
As we’ve talked about in the rest of this series, there are several ways to use the Open Systems Interconnection (OSI) seven layers of networking model to help us secure our networks and make them...
View ArticleThe OSI Model and You Part 5: Stopping Threats at the OSI Session Layer
In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we are...
View ArticleThe OSI Model and You Part 6: Stopping Threats at the OSI Presentation Layer
Our travels through the OSI seven layers of networking have shown that each layer has specific weaknesses and angles of attack. In turn, each has its best defenses. Now, we’ve come to the OSI...
View ArticleThe OSI Model and You Part 7: Stopping Threats at the Application Layer
A lot has changed since the creation of the Open Systems Interconnection (OSI) model. The OSI model dates back to the mid-1970s, designed to serve as a common basis for system interconnection and...
View ArticleThreat Modeling: The Key to Dealing With 5G Security Challenges
With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the...
View Article