FireMon is surveying security pros across the country about their biggest challenges with firewall policy management. Join FireMon in a city near you as their experts reveal the top answers and share firewall management best practices for tackling them head on! You’ll also get an introduction ...
Posts Tagged: Firewall
Recently, a data breach at the Office of Personnel Management (OPM) demonstrated once again the vulnerability of data and how even when an organization has seemingly deployed the right tools, security holes can be exploited to gain access to highly sensitive information. OPM is the federal organizat...
By Charles Hall Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats...
via the Council on Foreign Relations On Monday, China, along with Russia, Tajikistan, and Uzbekistan, asked UN Secretary-General Ban Ki-moon to circulate their proposed International Code of Conduct for Information Security as a formal UN document at the 66th session of the General Assembly. The Glo...
via International Business Times With news of 35 alleged Anonymous members currently being detained by the authorities, many analysts have come to question just how long it will be until LulzSec finds itself in law enforcement agencies firing lines following its high-profile cyber attack on the U.S....
via Fierce Government IT An audit from the Health and Human Services inspector general questions the ability of private sector hospitals to protect health information in electronic form. Under the Health Insurance Portability and Accountability Act, more commonly known as HIPAA, hospitals have a dut...
via PC Pro Mobile phones are the weak link in the UK’s cyber security set-up, according to university officials setting up a transatlantic security course. The University of Wales recently announced a tie-up with the Massachusetts Institute of Technology to work on developing cyber security st...
via Federal Computer Week In the wake of the WikiLeaks disclosures, all the soul searching and mandated risk assessments have made one thing painfully clear: Some of the most damaging security breaches originate from inside an agency’s firewalls. A new study helps quantify that reality. Accord...