Did you mean
implementation
Filter By Type

Search results

Padding Oracle in AES-NI CBC MAC Check (CVE-2016-2107)

Blog

craig.dabreo
May 4, 2016 - The developers of the OpenSSL project recently announced several vulnerabilities in the OpenSSL cryptography software.

5 Things You Can’t Miss at Enterprise Connect

Blog

dean.manzoori
March 3, 2016 - Enterprise Connect is being held next week in Orlando, FL. It’s one of the industry’s premier events on communications trends, providing insights from industry thought leaders, in-depth technical sessions, and the largest and broadest exhibition focused on systems, software and services.

European Information Security Directive Looms Large for CISOs

Blog

European Information Security Directivedavid.venable
January 19, 2016 - CISOs whose companies do business in Europe will soon have to review and in all probability update their security infrastructure and processes in response to the European Union’s Cyber-Security Directive that was released last month.

3 Ways That NFV Can Boost Network Security

Blog

nfvray.watson
November 4, 2015 - In mid-October, the leading standards group ETSI declared that security in the Network Functions Virtualization (NFV) environment represents both a major challenge and enormous opportunity.

Time to Start Managing Cyber Security Risk

Blog

david.venable
May 6, 2015 - The risk of cyber security threats is growing exponentially and failure to address it in a concerted way can result in serious consequences.

Additional Attack Vector Found for “Redirect to SMB” Vulnerability

Blog

Security Alertcraig.dabreo
April 24, 2015 - Details on new attack vectors for an 18-year-old vulnerability called “Redirect to SMB” were recently published, which could allow an attacker to redirect the user to a malicious SMB server and steal user credentials.

SSL Needs to Go

Blog

SSLdavid.venable
March 26, 2015 -

Endpoint Security: The Threat Stops Here

Blog

Endpoint Protectioncraig.dabreo
February 19, 2015 - The last line of cyber security defense for most organizations is endpoint security. Virtually all customers deploy some form of antivirus and anti-malware software on PCs, laptops, mobile devices and their trusted computing base (TCB).

Understanding Cloud-based Unified Communications

Blog

Cloud UCdean.manzoori
December 10, 2014 - Cloud-based unified communications is being widely adopted due to its ability to deliver cost savings and flexibility to businesses and their employees.

How Cloud-based Network Analytics Can Enhance Network Forensics

Blog

Cloud-Based Network Analyticsjames.hilving
August 15, 2012 - Learn the critical lessons enterprise companies learn when they use a high-performance network with built-in analytics and granular control.

REQUEST A FREE CONSULTATION