The most recent content from our members.
The National Institute of Standards and Technology (NIST) has created the standard known as NIST 800-171, which was created due in part to the FISMA bill signed into action as of December 2014. The standard is in place for a guide on the minimum requirements for federal information systems and as a voluntary guide for…
Network Operations Center (NOC) and Security Operations Center (SOC) are two critical pillars of any organization. Both teams continuously monitor logs and events from different tools to ensure that the network stays up and running and remains protected against cybersecurity attacks. The NOC team resolves incidents that…
Defending against cyber attacks from bad actors is easier said than done. While many areas need protection, Infoblox has been heads-down spreading the message about how to protect the DNS, which has become an increasingly popular attack vector for bad actors. We have been writing about DNS security for a while now. I…
Enterprise Security Needs are Changing Rapidly The manner in which employees work in global organizations has changed drastically over the years. Employees are less often stuck in their company building that is behind the corporate network a firewall and much more likely to be working remotely, from home, coffee shops, or…
The internet is a system of computers communicating with each other. But really, it’s a system of people talking to each other, and using computers to do it. An important step in this chain is called the Domain Name Service, or DNS. Your domain name is the actual name of your website in English (or your native language),…
Dossier is a threat indicator research tool that provides additional information on URLs, domains, and IP addresses by automatically aggregating contextual information from dozens of sources. It empowers threat analysts to obtain a complete view of the relationships and evolution of domains, IPs, and file hashes. Dossier’s…
The ubiquity – and convenience – of mobile devices and the increasing incidence of cybercrime is causing security challenges for most companies that are experiencing diminishing control over where and when employees use their devices. In an ideal situation, a company could implement enterprise security policies and content…
Many organizations will tell you that while they would like to provide employees unrestricted access to the Internet, it may not always be in the best interest when it comes to ensuring security or maintaining high employee productivity. Content filtering or content categorization is a key approach to preventing employees…
If you are a security operations specialist in a fairly large organization, you probably already know how difficult it is to manage multiple security tools, gather data from multiple sources, and make sense of those security alerts that never seem to stop. You need relevant data fast so that you can respond to threats…
It looks like you're new here. Sign in or register to get started.