DDOS Assault

Tuesday, October 25th, 2016

Protect Your Network from an IoT Device Attack – Like the Recent DDoS Assault on Dyn

On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access. Dyn, Inc., a company that provides domain name services for about 6% of Fortune 500 Companies, including Twitter, PayPal and Netflix, found itself battling DDoS attacks from a group of hackers. Read More »

Topic: , , , , ,


Monday, October 24th, 2016

Yesterday’s Technology & Cyber Risk Today: Time for a Security Assessment?

For most IT teams, addressing or thinking about cyber security is a daily concern. From updating AV software to creating security profiles, most IT professionals spend a portion of their day on tasks with a goal of securing their network. Read More »

Topic: , , , , ,

Securing the Enterprise Network

Monday, October 3rd, 2016

Securing Enterprise Networks from Rapidly Increasing Malicious Attacks

Enterprise organizations are appealing targets for hackers. These networks can provide everything from valuable personal data profiles, to financial and research data – all valuable commodities on the dark web.  The interest in targeted enterprise attacks has increased dramatically, with the number of enterprise users attacked by cyber threats almost doubling from 7% in 2014 to 13% in 2015.[i] With the rise of BYOD and IoT devices, enterprise wired and wireless networks are experiencing a dramatic increase in the size of their attack surface. Read More »

Topic: , , , , , ,


Thursday, September 22nd, 2016

Is your network causing bottle-necks that hinder growth?

We recently read a thought-provoking article authored by one of Bradford Networks’ technology partners Fortinet, titled Network Security in the New Service Provider Reality.  The article discusses how networks have to evolve and embrace the growing, dynamic distribution of data, as well as the growing variety of new devices and access needs. Read More »

Topic: , , , ,

53530887 - hacking hacker data information cyberspace concept

Tuesday, August 2nd, 2016

Why Hackers Go After Universities

Colleges and Universities are prime targets for hackers and cybercriminals because these institutions offer a target-rich environment that contains everything from financial, medical and personal data profiles, to government and commercial research. This information is a valuable resale commodity on the dark web. Read More »

Topic: , , , , , , , , ,

38416709 - network technician, data security concept

Monday, June 27th, 2016

Network Security: Is security automation the answer to the shortage of cyber security talent?

A shortage of experienced cyber security talent and increased cyber threats is causing greater need for network security automation. The shortage of cyber-security talent and the enormous increase in cyber attacks has been well documented.  The equation leaves enterprises fighting an uphill battle. Read More »

Topic: , , , ,

Network Security

Tuesday, May 17th, 2016

Network Security: Three Keys to Effective Network Segmentation in a World of Targeted Cyber-Attacks

Network segmentation is providing a critical network security defense against increasingly sophisticated cyber-threats Years ago, many IT departments weren’t focusing network security efforts on the “inside” of the network.  Rather than layering security solutions or leveraging security automation, the firewall was the singular line of defense against cyber-threats. Read More »

Topic: , , , , , , ,

Future of Cyber Security at Ignite 2016

Thursday, April 21st, 2016

The Future of Cyber Security & Preventing Attacks: Ignite Insights

We returned back energized from Palo Alto Networks’ Ignite 2016 annual user and partner conference with a better understanding of how the next generation cyber security solutions are keeping up with the “new generation” of adversaries that exploit secular trends such as mobility, social media adoption and expansion, and Internet of Things (IoT) to breach an organization’s network. Read More »

Topic: , , , , , ,

Western Michigan University

Tuesday, April 5th, 2016

WMU: Threat Containment in Seconds

Complete Picture of Network Threats from a Single Pane of Glass Western Michigan University (WMU) is one of the country’s leading research universities — and also a tempting target for cyber criminals. WMU needed to prevent inevitable cyber attacks within a university network used by thousands of students, contain a threat detected by the firewall before it can spread, and quickly access multiple systems to assemble the information needed to contain a threat. Read More »

Topic: , , , , , , , ,

Ignite 2016

Wednesday, March 30th, 2016

Security Automation and Driverless Cars?

JR Reagan, global chief information security officer, Deloitte, recently posted an article suggesting that human error is a major impediment to the effectiveness of cyber security programs today. If driverless cars could prevent accidents, could security automation and orchestration minimize the damage resulting from cyber attacks? Read More »

Topic: , ,