by Jennifer Collis on January 22, 2015
Good cyber hygiene means appropriately protecting and maintaining IT systems and devices and implementing cybersecurity best practices. When good cyber hygiene is built upon a continuous network monitoring platform, you continuously visualize the security posture of your entire IT infrastructure and better protect your organization against advanced cyber attacks.
by Diane Garey on January 20, 2015
This week, Tenable released a maintenance update for the Nessus vulnerability scanner. This update delivers several new features and some minor bug fixes. The new features are described here.
by Stacey Banks on January 16, 2015
The Federal Information Security Management Act (FISMA) of 2002 was put into place to implement a framework for the effectiveness of information security controls for Federal information systems, to provide oversight, and to provide for the development of minimum cont
by Jeffrey Man on January 7, 2015
by Cris Thomas on January 6, 2015
Recently there have been several great books that illustrate the importance of information security in today’s world, including Kevin Mitnick’s “Ghost in the Wires,” Andy Greenberg’s “This Machine Kills Secrets” and Brian Krebs’ “Spam Nation.” Joining the list at the
by Mehul Revankar on December 16, 2014
There was a time in early 2000 when the word "virtualization" was synonymous with VMware, and rightly so. After all, VMware started the second coming of this revolutionary technology after IBM.
by Ken Bechtel on December 11, 2014
Team Anti-Virus, an independent group of anti-virus researchers, published Ten Rules of Common Sense Computing and Virus Defense ten years ago to help educate network security personnel, end users, and the gener