Quantcast
Channel: nFX Blog One
Browsing all 20 articles
Browse latest View live

netForensics Celebrates 10 Years in the Federal Community with Federal...

netForensics today announced their 2010 Federal Customer User Group marks the company's 10th anniversary of providing security solutions to the federal market. The nFX Federal User Group is taking...

View Article



STUDY REVEALS 80% OF RESPONDENTS FEEL NETWORK THREATS WILL INCREASE IN 2010...

netForensics today announced a new study, entitled "Security in a Down Economy: Limited Budgets, Less Staff, More Threats," shows a perceived increase in network threats throughout 2010 and into 2011....

View Article

netForensics Joins the Cisco Developer Network and Completes Cisco...

netForensics today announced that it has joined the Cisco Developer Network as a Registered Developer within the network security technology category. In addition, netForensics nFX Cinxi One v4.1 has...

View Article

Prevention, Detection, and Reaction: What Works Best?

It's a dangerous place out there--the cyberworld, that is. We have witnessed unparalleled changes and growth over the last decade, yet with these changes and growth have come an increasing number of...

View Article

NJTC Annual Membership Meeting

Not so long ago, I remember that talking about information security management brought a lot of eyebrowse up, something of a black art, kind of like UNIX Administration. But in today's world, Cyber...

View Article


Smart Meter Papers from Ross Anderson and Shailendra Fuloria

This morning I posted a link on our twitter site about an article from Ross Anderson and Shailendra Fuloria on issues concerning the Governance and Security of Smart Meters. "Who controls the off...

View Article

SIEM Tools: They Are not All Created Equal--Part 1

I don't like to admit this, but I am not always as tolerant as I would really like to be. Certain things that people do and say sometimes catch my attention and cause me to think less of them. An...

View Article

Image may be NSFW.
Clik here to view.

Discussions on Risks with Embedded Medical Devices at the ISPAB

Jaren Doherty serves as both chief information officer and associate deputy assistant secretary for cybersecurity at the Department of Veterans Affairs. In his current position, Doherty led the...

View Article


netForensics' nFX Cinxi One Earns Perfect Score in SC Magazine Product Review

netForensics today announced that nFX Cinxi One, its powerful SIEM and log management appliance, has earned five out of five stars in SC Magazine's August 2010 product review. In its group test of...

View Article


Digital Object Memories in the Internet of Things

This workshop being held in Denmark on Sept. 26th, 2010 on Digital Object Memories. at the Ubiquitous Computing Conference The integration between biological technology and nano-technology should be...

View Article

Procrastinators and SIEM Technology

Procrastinators never cease to amaze them. They seem to have a ready excuse (no matter how lame) for every inaction and delay. Having taught in universities for many years, I found that procrastination...

View Article

netForensics Sees Double-Digit Growth in MSSP Revenues

netForensics today announced that the company exceeded expectations with MSSP revenues up 50%, resulting in another profitable quarter.  Driven by key strategic relationships and product enhancements...

View Article

Mistakes in Incident Response: Part 1

Incident response is generally defined as actions taken to protect and restore the normal operating condition of computers and the information stored in them when an adverse event occurs. The goal is...

View Article


Mistakes in Incident Response: Part 2

In my previous blog posting I defined incident response, described why it is so important, and then presented six of the most serious mistakes in incident response that people and organizations too...

View Article

Information Security Governance - Hybrid Security Cloud Provider Services and...

Information Security Governance - Hybrid Security Cloud Provider Services and Security Team Management Collaboration and Trust. One of the most important elements of Information Security Management is...

View Article


RSA 2011 Keynote address and Dr. Michio Kaku

Dr. Michio Kaku's keynote address at the RSA conference was full of thoughts on what the near future holds for us in the way of technology breakthroughs. Dr. Kaku quoted Woody Allen on eternity,...

View Article

RSA Conference 2011 - Hugh Thompson Show

The Hugh Thompson show has been part of the RSA closing for the last 5 years this year one of his closing guests was Alex Conran who has the BBC show "The Real Hustle" demonstrates to the audience just...

View Article


Certificate Authorities and Cloud Services

In the recent Article published by CRN Comodo Attack Sparks SSL Certificate Security Discussions. Brian Price writes about the Security and Trust of Internet Certificate Authorities "A spotlight on one...

View Article

MSPs Embrace the Virtual Firewall

The adoption of virtual firewalls and IDSs has begun to rapidly accelerate among Managed Security Service Providers. Virtual devices, including Juniper Vsys, Cisco ASA Virtual Context Features,...

View Article

Security Incidents - Suspicious Activities and Formal Investigations

Today's privacy laws, breach notifications, and other compliance requirements have further escalated the role of incident management in an effective security strategy. It is no longer enough to just...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images