AI intrusion detection AI can spot network intruders brilliantly, but it can also create more security disasters than it's preventing. By Jana Sedivy, VP of Customer Experience and Product Yes, AI is transforming network se... Industry Insights and Trends Security Threats and Vulnerabilities
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Enterprises Security Threats and Vulnerabilities
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Enterprises Security Threats and Vulnerabilities
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Security Threats and Vulnerabilities
Three Reasons to Protect Your Network Against BlastRADIUS There are mixed feelings in the security community about the urgency to protect networks from the BlastRADIUS vulnerability. Why fix a 30-year-old design flaw that can only be exploited by someone alr... Security Threats and Vulnerabilities
Big Tech Concentration Made CrowdStrike Update a Catastrophe As we dissect the CrowdStrike outage, we’ll find the human error was multiplied by the concentration in Big Tech, says network security expert Alan DeKok of InkBridge Networks. There will be intense r... Industry Insights and Trends Security Threats and Vulnerabilities