Bradford Blog

Tuesday, June 10th, 2014
Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation

New Whitepaper from ESG Highlights Need to Shift from Prevention to Detection and Remediation to Improve Cyber Security

According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach. This change of heart is directly linked to the recent wave of sophisticated malware, targeted attacks, advanced persistent threats (APTs), and visible security breaches occurring over the last few years. Read More »
Wednesday, June 4th, 2014
Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation

What You Do and Don’t Know Will Hurt You

Last week Zero Day Initiative (ZDI) published an advisory for a remote code execution vulnerability on Internet Explorer 8 (IE8) that has been left unpatched for over six months since ZDI reported it to Microsoft. The vulnerability allows an attacker to gain user access rights to a system after a user visits a malicious page or opens a malicious file. Read More »
Tuesday, May 27th, 2014
Topics: Cyber Threats, Network Security, Rapid Threat Response, Security Automation

The eBay Breach — Here We Go Again

By now you’ve probably heard that eBay was recently the victim of a massive cyber attack, with the personal details of some 145 million users falling into the hands of hackers. After the Target breach late last year, many organizations are now wondering if they will be next — and what, if anything, they can do about it. Read More »
Thursday, May 1st, 2014
Topics: Cyber Threats, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Windows XP

Someone’s Left the Windows Wide Open

** BREAKING NEWS….Microsoft has reversed its previous decision and will now provide a patch for Windows XP despite the fact that it no longer supports this operating system. Read more here.** After 13 years, Microsoft terminated support for Windows XP.   Read More »
Monday, March 24th, 2014
Topics: Analytics, Endpoint Compliance, Network Security, Network Visibility, Windows XP

R.I.P. XP… Gone But Not Forgotten… by the Cyber Criminals

After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much more vulnerable to viruses and other malware, and a tempting target for cyber criminals. Read More »
Thursday, March 20th, 2014
Topics: Cyber Threats, Endpoint Compliance, Network Access Control, Network Infrastructure, Network Security, Network Visibility, Rapid Threat Response, Security Automation

Pre-Connect Compliance Check or Not?

As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card data, intellectual property, personal identity details, or military secrets and sending it to Uzbekistan. Read More »
Thursday, March 6th, 2014
Topics: Network Access Control, Network Infrastructure, Network Security, Security Automation

RSA Recap: Automated Threat Response Takes Center Stage

Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA had in aiding the NSA surveillance program, but the buzz on the show floor was different. Read More »
Friday, February 7th, 2014
Topics: Bradford Blog, Cyber Threats, Endpoint Compliance, Network Infrastructure, Network Security, Rapid Threat Response, Security Automation

Don’t Expect What You Don’t Inspect

Businesses integrate their networks so they can streamline business processes.  The goal is to lower operating costs and achieve higher operating efficiency.  But in addition to the benefits, there is a significant level of risk that is introduced when a connection is made to a network outside of a company’s domain of management.  Read More »
Wednesday, January 22nd, 2014
Topics: Bradford Blog, Mobile Device Management, Network Access Control, Network Infrastructure, Network Security, Network Visibility

VMware’s Acquisition of AirWatch Reinforces Demand for Securing Mobile Devices

Organizations welcome the productivity gains of mobile devices but their two biggest challenges have been manageability and security. To maximize the leverage from these devices, they need to have the right configurations, applications, and content. Through this acquisition VMware will certainly leverage AirWatch’s management and control over mobile devices to set key configuration settings, deploy applications, and share content. Read More »