The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection

Hybrid Cloud WAF is the answer.  Now what was the question?

Let’s back up a minute.  There is an ancient riddle which goes something like this:

You are walking down a path and come upon a fork in the road. One side is the good path and the other side is the bad path. However, you don’t know which one is which and both paths are guarded by identical twins. One guard tells the truth and the other, always tells lies. If you want to take the good path, what should you ask the guards? You would ask "which path would your brother go?" Then, take the path opposite from where they are pointing.

read more

Cyber-Security Concerns to Know Before You Sign On

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

Any of us who use the Internet with regularity enjoy the benefits of Federated Identity Management (FIM) and Single Sign-On (SSO) without much thought. Because of these technologies, we are able to move between our favorite blog site, news center, or social media site (Twitter, Facebook, LinkedIn, etc.) without having to struggle for log in information.

read more

What’s the Relationship Between Security and SDN Deployment?

A couple of years ago the discussion of SDN focused primarily on the fact that SDN separated the network control function from the network forwarding function and that separation of functions might require the introduction of new protocols such as OpenFlow. More recently there has been a lot of discussion about the value of an overlay SDN model vs. an underlay SDN model and the role of specialized hardware in either model. All of these discussions are important and they all are focused on key architectural characteristics of SDN.

read more

The Rise of Hybrid — The New DDoS Protection Model [WEBINAR]

What is something nearly everyone needs, something nearly everyone asks for, something everyone provides, but also something nearly no one takes?

Answer:  Advice.

If you have spent considerable time wondering what to do about the evolving DDoS threat, you are not alone.  The threat has become a bona fide menace and protecting a business, its information, and its network is no longer just the responsibility of an IT technician.  These threats and the damage they can inflict are real and I’m offering my experience and advice in a new DDoS Webinar hosted by Infonetics.

read more

Are You Protected Beyond Volumetric Attacks?

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

There are numerous types of DDoS protection for your business. I’d like to expand on that topic and discuss how organizations are affected by non-volumetric DDoS attacks and what they can do to recover.

read more

The Security Concerns of SSL/TLS Encrypted Traffic

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) sites are used today to secure transactions on banking sites, health care portals, and enterprise network and application portals.  The use of these sites on the Internet has been increasing in past years and the volume of this type of traffic continues to grow, feeding speculation that perhaps one day these secure sites could replace clear-text HTTP. 

read more