Tags » IT Security

Check Point Security Gateway R75.20 HFA 20 ... *SLASH* ... A Tale of Checkpoints mysterious disappearing packets ... 'Negated'

Morning … so we had a new layer 7 application rolled out on our network. This application pretty much used http and https POST, GET, packets to communicate and it wasn’t working. 670 more words



High density fiber enclosures can maximize the amount of active equipment in a data center by minimizing the footprint of the networking infrastructure — but there’s a problem — all that fiber in a small amount of space creates problems when changes need to be made. 151 more words

IT Security

Join us for the 9/18/15 Security Briefing Webinar

Event: Security Briefing Webinar: 7 Major security trends you should be aware of

Presented By: David Stelzl, speaker, author, and coach in high tech sales & marketing strategy… 239 more words

IT Security

Using Technology to Strategically Drive Holistic Risk Management

by Michael Diehl

A recent report from the Economist, sponsored by SAP, lays out the case for holistic enterprise risk management and why it’s a vital necessity for modern business. 630 more words

Enterprise Performance Management

Momentum is picking up for Security Serious Week – 26th-30th October

Just back from my hols and it’s heartening to see that whilst I’ve been away so many great movers and shakers in the IT security world have signed up to get involved in Security Serious Week in October. 295 more words

State Data Center: First steps to address longstanding security risks, much more to do

Executive Summary

Over the last nine years, security weaknesses at the state data center have put confidential information at risk. These weaknesses continued because the state abandoned initial security plans, did not assign security roles and responsibilities, or provide sufficient security staff. 517 more words