Home / Bradford Networks Blog
Tuesday, August 2nd, 2016
Colleges and Universities are prime targets for hackers and cybercriminals because these institutions offer a target-rich environment that contains everything from financial, medical and personal data profiles, to government and commercial research.
Monday, June 27th, 2016
A shortage of experienced cyber security talent and increased cyber threats is causing greater need for network security automation. The shortage of cyber-security talent and the enormous increase in cyber attacks has been well documented.
Tuesday, May 17th, 2016
Network segmentation is providing a critical network security defense against increasingly sophisticated cyber-threats Years ago, many IT departments weren’t focusing network security efforts on the “inside” of the network.
Thursday, April 21st, 2016
We returned back energized from Palo Alto Networks’ Ignite 2016 annual user and partner conference with a better understanding of how the next generation cyber security solutions are keeping up with the “new generation” of adversaries that exploit secular trends such as mobility, social media adoption and expansion, and Internet of Things (IoT) to breach an organization’s network.
Wednesday, March 30th, 2016
JR Reagan, global chief information security officer, Deloitte, recently posted an article suggesting that human error is a major impediment to the effectiveness of cyber security programs today.
Monday, November 9th, 2015
Forrester Research predicts by the year 2020 there will be 70 devices for every person on earth.1 That’s a difficult number to fathom!
Wednesday, May 13th, 2015
Global Distribution Helps Drive Record Revenues for Bradford Networks Boston, Mass. – March 12, 2015 — Bradford Networks, the leading provider of continuous incident response solutions, today announced that Fishnet Security is the 2015 North American Partner of the Year, and Shifra is the International Partner of the Year.
Tuesday, December 9th, 2014
If you watch 60 Minutes, you may have seen “What Happens When You Swipe Your Card” that aired on November 26.
Tuesday, June 10th, 2014
According to ESG, after years of settling for “good enough” IT security, enterprise organizations are now finally realizing that this is no longer an adequate approach.
Wednesday, June 4th, 2014
Last week Zero Day Initiative (ZDI) published an advisory for a remote code execution vulnerability on Internet Explorer 8 (IE8) that has been left unpatched for over six months since ZDI reported it to Microsoft.
Tuesday, May 27th, 2014
By now you’ve probably heard that eBay was recently the victim of a massive cyber attack, with the personal details of some 145 million users falling into the hands of hackers.
Thursday, May 1st, 2014
** BREAKING NEWS….Microsoft has reversed its previous decision and will now provide a patch for Windows XP despite the fact that it no longer supports this operating system.
Thursday, April 10th, 2014
The Security Gap The security industry has made significant investments and improvements in cyber threat detection but containment (time from threat detection to remediation) is still a very manual, costly, and drawn-out process.
Monday, March 24th, 2014
After April 8, 2014, Microsoft will no longer provide support for Windows XP. The end of automated patching and security fixes for Windows XP means that machines running this Operating System will now become much more vulnerable to viruses and other malware, and a tempting target for cyber criminals.
Thursday, March 20th, 2014
As we all know, one of the biggest security concerns of organizations today is how to detect and stop “Day Zero” attacks —- breaches that occur without warning, capturing sensitive information such as credit card data, intellectual property, personal identity details, or military secrets and sending it to Uzbekistan.
Thursday, March 6th, 2014
Like many of you, we just returned from the annual RSA Conference. In the lead up to the conference much of the press focused on the NSA revelations and the alleged role companies like RSA had in aiding the NSA surveillance program, but the buzz on the show floor was different.
Friday, February 7th, 2014
Businesses integrate their networks so they can streamline business processes. The goal is to lower operating costs and achieve higher operating efficiency.
Wednesday, January 22nd, 2014
Organizations welcome the productivity gains of mobile devices but their two biggest challenges have been manageability and security. To maximize the leverage from these devices, they need to have the right configurations, applications, and content.
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.