96 Results for:dmz

  • Sort by: 

Reinforce industrial control system security with ICS monitoring

By Sharon Shea 05 Apr 2023

Monitoring an industrial control system environment isn't that different from monitoring a traditional IT environment, but there are some considerations to keep in mind. Read More

How to start handling Azure network security

By Kyle Johnson 05 May 2023

Before adopting Microsoft Azure, it's important to consider how to secure the cloud network. That's where network security groups and Azure Firewall come in. Read More

How to build a honeypot to increase network security

By Ben Lutkevich 31 Mar 2021

Create a honeypot that will trap attackers and monitor their activities to enhance your organization's network security. This step-by-step guide takes you through the process. Read More

ICS kill chain: Adapting the cyber kill chain to ICS environments

By Sharon Shea, Packt Publishing 05 Apr 2023

As IT/OT convergence continues to gain traction, industrial control system security cannot be ignored. Performing pen tests based on the ICS Kill Chain can help. Read More

Prepare your data center for a hybrid cloud strategy

By Tom Nolle 13 Jan 2020

On-premises assets and public cloud resources won't work together without a clear hybrid cloud strategy. Learn how to prepare your on-premises architecture for hybrid cloud. Read More

Why is malware analysis important?

By Kyle Johnson, Packt Publishing 07 Dec 2022

Malware continues to plague all organizations, causing data loss and reputational damage. Discover how malware analysis helps protect companies from such attacks. Read More

3 DDoS mitigation strategies for enterprise networks

By John Cavanaugh 10 Aug 2020

Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service. Read More

Cato aims to bust cyber myths as it extends network protections

By Alex Scroxton 20 Jul 2022

Cato Networks is beefing up its platform’s security features with ransomware and data loss protections, and the firm’s security strategy lead Etay Maor is using the occasion – and his unique access to billions of ... Read More

What to know about VPN termination

By Terry Slattery 18 Jun 2020

Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Read More

SASE challenges include network security roles, product choice

By John Cavanaugh 14 Jan 2021

Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Read More