Managed Web Application Firewall – Identifying and Stopping Complex Web-based Attacks

James D. Brown, CTO, StillSecure Web Application Firewalls (WAF) have been in the news a lot in the past few years. A type of application firewall, web application firewalls have functionality that goes beyond simply blocking access to certain types of requests or services. Web application firewalls are also aware of specific types of web-based [...]

Managed IDPS – Stopping Attacks before They Cause Damage

James D. Brown, CTO, StillSecure Intrusion Detection and Prevention Systems (IDPS) is such a key security technology that you might expect me to talk about it first in my multi-part series on security technologies. While it’s hugely important, without a firewall and VPN, it provides very little protection. As I’ve done with each of these [...]

“Cleaner Pipes” means increased bandwidth for your Internet and your staff. Why cloud/network security makes sense.

Guest Post by Fran Leyland White, Hosted Security Product Manager, XO Communications Your company has many assets: employee information, intellectual property, strategies, patents & pending patents, nondisclosure agreements, financial information, and its reputation. You need to keep these safe. Cloud-based security has many benefits over the traditional premise-based model. It is less expensive, more efficient, more [...]

Managed Firewall: What’s in it for me?

James D. Brown, CTO, StillSecure This is the first part in a multi-part series discussing various security technologies, where they fit, why they’re valuable, and why no single security tool is sufficient to protect your environment. My goal is to educate in terms understandable to those with a basic knowledge of information technology and networking, [...]

How To Ruin A Cyber-Attacker’s Day

Since the earliest days of humankind, there has been an ongoing race between those trying to protect what they have (the havers), and those trying to take from others (the takers). In physical terms, this has meant the use of safes, locks, walls, gates, fences, guards, cameras, radar and other technologies. Any one of those [...]

Beyond the Firewall: What You Need to Know About Threats and Security in 2012

In the last year and a half, the incidence of cyber theft has surpassed physical theft for the first time in history. This might seem surprising, given the push in recent years to educate consumers and businesses about online safety. But sometimes a little education can be a dangerous thing, causing those who have taken [...]