All Security
joanna

5 ways of verifying security risks and avoiding false positives

I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is...

joanna

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies...

mikel

How to set up Scrutinizer single sign-on with Azure AD

Single sign-on (SSO) is a way to secure users while reducing the number of passwords they need to remember. SSO has been a highly...

joanna

Phishing detection: what not to do and how we help

Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we...

joanna

How to Protect Your Network Against the ‘Sea Turtle’ DNS Hijacking Campaign

A large-scale DNS hijacking campaign called ‘Sea Turtle’ has been spreading across more than 13 countries. With our FlowPro Defender, you can monitor your...

joanna

Configuring Scrutinizer for LDAP Authentication

Local authentication into software or even hardware is useful for both the end user and the organization as a whole. Logging in with your...

bobn

Three Microsegmentation Challenges Facing NetOps and SecOps

Microsegmention refers to the use of software to secure traffic between virtual machines (VMs) within virtualized data centers. Virtualization has increased organizations’ agility and...

mikelp

Internet Use Policies: Do Your Employees Even Know What is Acceptable?

I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...

critical thinking

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...