Home / Bradford Networks Blog
Monday, November 9th, 2015
Forrester Research predicts by the year 2020 there will be 70 devices for every person on earth.1 That’s a difficult number to fathom!
Wednesday, May 13th, 2015
Global Distribution Helps Drive Record Revenues for Bradford Networks Boston, Mass. – March 12, 2015 — Bradford Networks, the leading provider of continuous incident response solutions, today announced that Fishnet Security is the 2015 North American Partner of the Year, and Shifra is the International Partner of the Year.
Tuesday, December 9th, 2014
If you watch 60 Minutes, you may have seen “What Happens When You Swipe Your Card” that aired on November 26.
Tuesday, June 10th, 2014
According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach.
Wednesday, June 4th, 2014
Last week Zero Day Initiative (ZDI) published an advisory for a remote code execution vulnerability on Internet Explorer 8 (IE8) that has been left unpatched for over six months since ZDI reported it to Microsoft.
Tuesday, May 27th, 2014
By now you’ve probably heard that eBay was recently the victim of a massive cyber attack, with the personal details of some 145 million users falling into the hands of hackers.
Thursday, May 1st, 2014
** BREAKING NEWS….Microsoft has reversed its previous decision and will now provide a patch for Windows XP despite the fact that it no longer supports this operating system.
Thursday, April 10th, 2014
The Security Gap The security industry has made significant investments and improvements in cyber threat detection but containment (time from threat detection to remediation) is still a very manual, costly, and drawn-out process.
Monday, March 24th, 2014
After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much more vulnerable to viruses and other malware, and a tempting target for cyber criminals.
Thursday, March 20th, 2014
As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card data, intellectual property, personal identity details, or military secrets and sending it to Uzbekistan.
Thursday, March 6th, 2014
Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA had in aiding the NSA surveillance program, but the buzz on the show floor was different.
Friday, February 7th, 2014
Businesses integrate their networks so they can streamline business processes. The goal is to lower operating costs and achieve higher operating efficiency.
Wednesday, January 22nd, 2014
Organizations welcome the productivity gains of mobile devices but their two biggest challenges have been manageability and security. To maximize the leverage from these devices, they need to have the right configurations, applications, and content.
Monday, January 20th, 2014
There’s been a wave of industry buzz recently about Software-Defined Networking (SDN) and how it’s going to transform the way networks are built, managed used and accessed.
Thursday, January 2nd, 2014
Happy New Year! As we look ahead to 2014, I see some general themes emerging across the industry around threat detection and remediation which I’d like to share with you.
Wednesday, December 18th, 2013
Every year at holiday time, publications like CNET, Network World, PC World and others produce their annual “gift guide for geeks.” Those guides often include a range of digital devices, including smart phones, tablets, gaming devices, wifi enabled cameras and other gadgets.
Sunday, December 8th, 2013
It’s a challenge that’s fundamental to BYOD: how to redirect unknown devices and users to a portal, in order to determine the appropriate level of network access to provision.
Monday, December 2nd, 2013
More and more employees are bringing their personal mobile devices to work, yet many companies are slow to respond to the trend.
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.