article thumbnail

Fed Tech Roundup September 30

CTOvision

Northrop Grumman to Feature Maritime Security Capabilities at Pacific 2015. Costly blimp surveillance program is looking a little deflated - GCN.com. Dynamic firewall to help defend from DDoS attacks - GCN.com. Audit: Federal networks still vulnerable - The Hill. Federal government awards Ben Franklin $1.7

Firewall 150
article thumbnail

Fed Tech Roundup August 5

CTOvision

Questions Your Federal Agency Should Ask About Next-Gen Firewalls - FedTech Magazine. 1 on 2015 Fast 50. Introducing the 2015 Bold Award Finalists - Nextgov. Executive Profile: Regina Genton, Raytheon VP for Space & Intell Programs. Top feds talk agile - FCW.com. NYC to refine body camera policies - GCN.com.

Firewall 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

Remember that attackers can use programs that masquerade as legitimate applications, and continue to watch for suspicious behavior, even from legitimate, trusted applications. Their trifecta of Next Generation Firewall, Threat Intelligence and Advanced Endpoint Protection, can be the key to proactive mitigation of the cyber threat.

Network 150
article thumbnail

RiskIQ Accelerates Momentum Across Entire External Threat Management Solution Set in First Half of 2016

CTOvision

Triples bookings for RiskIQ PassiveTotal compared to the prior six months (2H 2015). RiskIQ PassiveTotal saw over 300 percent in bookings growth compared to the second half of 2015. RiskIQ Accelerates Momentum Across Entire External Threat Management Solution Set in First Half of 2016.

Firewall 150
article thumbnail

How Big Data is Helping Improve Security

CTOvision

According to the 2015 Verizon Data Breach Investigations Report, 85 percent of data breaches go undetected. Cyber attackers always seem one step ahead of their targets, meaning that even if organizations use firewalls and anti-malware programs, hackers can still find ways around the defenses.

Big Data 150
article thumbnail

The Perfect and Continuous Storm: Understanding the Cyber Implications of the Regulatory Governance For Security Advisors

CTOvision

One key case mentioned by Sprickerhoff was the 22 Sep 2015 announcement that the SEC and an investment advisor agreed to settle charges based on poor cybersecurity posture of a firm (see SEC Charges Investment Advisor With Failing To Adopt Proper Cybersecurity Practices ).

article thumbnail

Data Security and its Importance on the Internet

Galido

In 2015, the Wall Street Journal estimated that the cost of cyber crime in the U.S. There are many well made anti-virus programs available. Anti-virus programs can catch most malicious bugs that enter your system. Turn on your firewall. These can include games, archived files, exe files, documents and other programs.