article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

Firewall 113
article thumbnail

Cisco Secure Firewall Garners a ‘Hat-Trick’

Cisco Security

The team would present a bowler with a hat to celebrate the achievement. Along similar lines, Cisco Secure Firewall celebrates three scores in 2021: Cisco was the only vendor recognized by Frost & Sullivan with the Best Practices Market Leadership Award for excellence in the network firewall market.

Firewall 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Replace Your SIEM with Neural Net Technology

Security Boulevard

Security Information Event Management (SIEM) systems are an outdated technology. It’s no longer enough to just manage information – today’s organizations need technology that can proactively detect and respond to dynamic threats as well. Security teams who are relying on SIEMs are using technology that is rapidly becoming obsolete.

article thumbnail

Malware Evolves to Present New Threats to Developers

Security Boulevard

Network control measures like firewalls, secure socket layer (SSL), and data loss prevention (DLP) tools sought to outmaneuver malicious code rather than directly combat it. Threat actors quickly realized the shared-responsibility model used by cloud services presented ample opportunities for exploitation.

Malware 96
article thumbnail

GUEST ESSAY: A primer on content management systems (CMS) — and how to secure them

The Last Watchdog

Today, there are two major types of common CMS platforms: •The older “traditional” or “monolithic” CMS platforms include a content repository (usually a multimedia database), the administrative console (where content is added and categorized), the presentation system (which makes nice-looking pages), and the search engine. Gierlinger.

article thumbnail

5 Top Questions About Deception Technology in Cybersecurity

SecureWorld News

Your questions about deception technology in cybersecurity, answered. What exactly is deception technology and how can it play a vital part in your cyber defense? Meyer was presenting as part of the SecureWorld Virtual Conference series. Meyer was presenting as part of the SecureWorld Virtual Conference series.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. That said, a couple of prominent legacy technologies seem sure to endure as security cornerstones, moving forward.

Firewall 224