Home / Bradford Networks Blog
Tuesday, June 10th, 2014
According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach.
Wednesday, June 4th, 2014
Last week Zero Day Initiative (ZDI) published an advisory for a remote code execution vulnerability on Internet Explorer 8 (IE8) that has been left unpatched for over six months since ZDI reported it to Microsoft.
Tuesday, May 27th, 2014
By now you’ve probably heard that eBay was recently the victim of a massive cyber attack, with the personal details of some 145 million users falling into the hands of hackers.
Thursday, May 1st, 2014
** BREAKING NEWS….Microsoft has reversed its previous decision and will now provide a patch for Windows XP despite the fact that it no longer supports this operating system.
Thursday, April 10th, 2014
The Security Gap The security industry has made significant investments and improvements in cyber threat detection but containment (time from threat detection to remediation) is still a very manual, costly, and drawn-out process.
Monday, March 24th, 2014
After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much more vulnerable to viruses and other malware, and a tempting target for cyber criminals.
Thursday, March 20th, 2014
As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card data, intellectual property, personal identity details, or military secrets and sending it to Uzbekistan.
Thursday, March 6th, 2014
Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA had in aiding the NSA surveillance program, but the buzz on the show floor was different.
Friday, February 7th, 2014
Businesses integrate their networks so they can streamline business processes. The goal is to lower operating costs and achieve higher operating efficiency.
Wednesday, January 22nd, 2014
Organizations welcome the productivity gains of mobile devices but their two biggest challenges have been manageability and security. To maximize the leverage from these devices, they need to have the right configurations, applications, and content.
Monday, January 20th, 2014
There’s been a wave of industry buzz recently about Software-Defined Networking (SDN) and how it’s going to transform the way networks are built, managed used and accessed.
Thursday, January 2nd, 2014
Happy New Year! As we look ahead to 2014, I see some general themes emerging across the industry around threat detection and remediation which I’d like to share with you.
Wednesday, December 18th, 2013
Every year at holiday time, publications like CNET, Network World, PC World and others produce their annual “gift guide for geeks.” Those guides often include a range of digital devices, including smart phones, tablets, gaming devices, wifi enabled cameras and other gadgets.
Sunday, December 8th, 2013
It’s a challenge that’s fundamental to BYOD: how to redirect unknown devices and users to a portal, in order to determine the appropriate level of network access to provision.
Monday, December 2nd, 2013
More and more employees are bringing their personal mobile devices to work, yet many companies are slow to respond to the trend.
Sunday, November 17th, 2013
From time to time we report on the unintended consequences of BYOD, and what can happen when users own the devices but those devices are on your network.
Tuesday, October 29th, 2013
Adobe recently announced a cyber attack on its network, where hackers stole the source code for Adobe Acrobat and other Adobe products used on personal computers and servers worldwide.
Monday, October 7th, 2013
Locking down today’s dynamic networks while supporting personal and corporate devices of all kinds requires a NAC solution up to the task.
Wednesday, September 11th, 2013
Controlling access to corporate networks and information is one of the biggest cyber security priorities companies have today. A network can only be as secure as the devices that are connected to it, and organizations need to ensure that they are doing all they can to protect access to valuable corporate assets.
Tuesday, September 3rd, 2013
To secure your network, you first have to detect what’s on it. You have to identify what type of device is trying to connect and make sure it’s free of vulnerabilities and malware before it gets on the network.
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.