Newsroom

17
Apr

The threat of insider tampering with data systems is a constant worry for IT managers. Such threats, currently on the rise, are caused by employees or associates (including contractors and partners) of an organization who either maliciously or accidentally put their organizations and data at risk. Most expensive, high-profile breaches are the result of attack techniques used inside ...

10
Apr

5 tips to combat DDoS attacks

Distributed denial-of-service attacks have become a downright pandemic for many businesses. Sometimes, as Continuity Central pointed out, these threats are motivated by political or ideological causes. At other times, the attacker is simply hoping to make headlines by targeting high-profile enterprises. Whatever the reasons behind them, DDoS incursions are a serious threat to the data of businesses, homes and governments ...

02
Apr

Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. Read More >>  

25
Mar

If you were to ask an IT professional how they felt about NAC 1.0, the responses would not be too pleasant. The reason is that just a few years ago, NAC was a rigid and very complex technology. The amount of trouble the solution gave IT was simply not worth the headache. Enterprises want to implement an ...

20
Mar

Free Report | Top Ten Database Threats

Learn How To Spot and Stop These Complex Threats Corporate databases contain the crown jewels of an organization, which means a break-in, by insiders (employee) or outsiders (Hacktivist/Cybercriminal), can cost millions in fines, lawsuits, and customer attrition. The good news is there are 10 commonly used methods to attack databases. Defend against these, and you will have ...

20
Mar

Does Your Business Have A ‘NAC’ For Cyber Threats?

  Almost all modern enterprises are stuck with similar information security pain points. IT infrastructure is now more complex than ever due to the increased diversity of endpoint operating systems, increasing network connectivity and cloud adoption and increases in mobility. The percentage of organisations formally endorsing BYOD initiatives is expected to skyrocket from 31 percent ...

20
Mar

  A search over the last 30 days on "security breach" produces seemingly divergent headlines about Target’s point of sale malware, University of Maryland’s records loss, Sally Beauty, Neiman Marcus, Michaels, Sears’ credit-card losses, Forbes’ web page takeover, and (most recently) Urobouros (the Ukranian malware outbreak). It seems like security is consistently being defeated by ...

12
Mar

Breaking protocol: DDoS attacks

  When the first wave of distributed denial-of-service (DDoS) attacks hit several, large financial institutions in the fall of 2012, a scramble ensued to get websites back up and quell the fears of understandably rattled customers.   Read More >>

07
Mar

The New Art of War: 2014 Targeted Attacks Study

How to Detect, Predict and Eliminate Advanced Targeted Threats From the hacktivists who deploy powerful distributed-denial-of-service attacks, to nation states that pilfer competitive information, as well as organized crime rings that siphon payment card data from the likes of Target and Neiman Marcus... the ...

07
Mar

Corero Network Security (LSE: CNS), a leading provider of First Line of Defense®security solutions, today announced that its DDoS Defense technology for the Enterprise was selected for two 2014 Info Security Global Excellence Awards. The Corero First Line of Defense solution received silver in the “Security Products and Solutions for Medium Enterprises” category and bronze in “Security Products for Finance and ...

RESOURCES

As the pace of Microsoft SharePoint ad option continues, most organizations are turning to third party add-ons demands for functionality. It’s for these reasons that experts compare SharePoint without add-ons to an iPhone without apps.

EVENTS & PROMOTIONS

Check out the latest events and promotions happening at Secure Source

SOLUTIONS

Secure Source’s partnership with our partners provides our clients access to the latest technologies, premier technical support, advanced training and product certification