Quantcast
Channel: Nusecure
Browsing all 89 articles
Browse latest View live

Social networking within a company (Part 1)

I attended a security conference a short time back (http://nuspire.com/CAMPIT.aspx).  There were two panel discussions that involved the securing of network data sources while allowing social...

View Article



Social networking within a company (Part 2)

The issues around social networking are basically the same as in the past.  The general user population wants, even demands that social networking be allowed within and from outside the corporate...

View Article

Image may be NSFW.
Clik here to view.

Data Explosion

  Many years ago, MANY years ago, I bought a PC with a 10 Megabyte hard drive.  All my friends were envious of me having that tremendous amount of storage. I would joke that I would never use that much...

View Article

Moore's Law

Many of us have heard of Moore's law or have used the term when discussing the increases in computing power over the last couple of decades. The law was named after Gordon E. Moore, co-founder of...

View Article

Privacy on the Web (Part 1)

As a security professional, I have monitored privacy laws for the past decade or so. My interest in these laws started long before that when a friend gave me a book about privacy that was prompted by...

View Article


Privacy on the Web (Part 2)

We  look at the privacy items in this manner to discuss something many of us have done and will probably do in the future.  We have filled out online forms that capture our personal "public" data with...

View Article

Vulnerability Management

Vulnerability management has and is an important aspect of a company's security posture.  The managing of vulnerabilities was instituted by IT professionals that were involved by what they...

View Article

Cloud Security: What does it mean? (Part 1)

I have been asked many times in the last few years about my definition of security in the cloud.  I find this a question that should be answered with a question.  I personally don't like it when I ask...

View Article


Cloud Security: What does it mean? - Part 2

One of the advantages of using SaaS for anti-spam, anti-virus, and anti-spyware blocking is the ability of these services to reduce the amount of traffic into the private network.  The reporting of the...

View Article


Looking back at 2011

This is the time of year that most of us look back at the last twelve months and evaluate what was accomplished.  We also look back at things we worked on to improve our internal networks to determine...

View Article

Nuspire speaks to Fox2News Detroit about Target breach

The situation with Target Corporation has captured the attention of many Americans and shows just how vulnerable large chains like Target can be to data theft.  Nuspire specializes in protecting large...

View Article

MSSP Nuspire Networks releases the next generation of the NuSecure Small...

Nuspire Networks, a global leader in enterprise network security services, released its next generation Unified Threat Management (UTM) device for small office, branch office and retail environments....

View Article

Nuspire Networks releases Retail Vulnerabilities Interactive Infographic

Nuspire Networks, a global leader in enterprise network security services, has released an Interactive Infographic which details network security vulnerabilities that retailers need to be aware of and...

View Article


Cybersecurity 101: Defined

Taking cybersecurity threats seriously can be a challenge with all the playful names floating around, but the damage caused can be devastating. Could all of these cyberthreat “nicknames” create...

View Article

Breaking: Possible credit card data breach at Goodwill locations nationwide

Attention, thrifty shoppers -- financial institutions across the country are tracking what could be a series of credit card breaches involving Goodwill customer data pulled from various store...

View Article


Understanding Managed Security Services

Network monitoring and management service demands have grown steadily as the corporate world moves towards global Internet-based transport architectures, adding to the range, complexity, regulatory...

View Article

SIEM | Log Management | Event Management

An Enterprise Essential -- Financial institutions, defined as any business that engages in financial activities ranging from insurance brokerage to data processing to automobile financing/leasing, are...

View Article


Image may be NSFW.
Clik here to view.

Monitoring and Reporting for PCI Compliance

A challenge for many organizations is determining how to best meet PCI requirements across the entire computing environment. Key hurdles that need to be dealth with include risk assessment, auditing...

View Article

Image may be NSFW.
Clik here to view.

Nuspire Supports Twilight Benefit Foundation

Twilight Benefit Foundation Chairman, Saylor Frase, announced that the Twilight Benefit Foundation hosted its eighth annual golf tournament benefiting Cameron’s Crusade and Rachel’s Fundraiser. The...

View Article

Image may be NSFW.
Clik here to view.

Jimmy John's Investigating Potential Mega Breach

BREAKING: A pattern of fraudulent transactions involving nationwide sandwich chain Jimmy John’s customer credit card data is being tracked. The company recently released a report stating it is working...

View Article
Browsing all 89 articles
Browse latest View live



Latest Images