February 28, 2022 Pierluigi Stella

AI & Cybersecurity

Something I keep hearing of late is what cybersecurity is set to look like this year (and beyond), as well …

read more
August 03, 2016 Pierluigi Stella

Why You Need A WAF – Part 1

At the time of writing of this blog, attacks against web servers are (by far) the most prevalent issue in …

read more
November 28, 2018 Sheela Goh

How I Protect My Personal Data From Cyber Threats

I’ve resisted writing for the blog for almost six years now, for the simple reason that I simply did not …

read more
June 11, 2021 Sheela Goh

SIEM & Logs To Collect

As we increasingly deploy the SIEM within client networks, we're learning some good lessons. Generally, there seems to be a misunderstanding …

read more
March 04, 2020 Pierluigi Stella

How A SIEM Keeps Watch, Like Big Brother, But Over Your Network – Part I

Since 2000, our sole agenda is to provide Enterprise class perimeter security defense to the SMB market.  For two decades, …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


    All latest news

    January 28, 2014 Network Box USA

    At CES, new data collection in gadgets raises interest, and eyebrows

    By Andy Vuong LAS VEGAS — As the Consumer Electronics Association prepared Sunday to welcome the world’s largest gathering of technology …

    January 27, 2014 Network Box USA

    6 Dirty Secrets of the IT industry

    By Dan Yynan IT pros usually know where the bodies are buried. Sometimes that’s because they’re the ones holding the shovel. We …

    December 17, 2013 Network Box USA

    The Year DDoS Got Real for CUs

    Before 2013, Distributed Denial of Service attacks seemed to many credit union executives as something the other guys worried about. …

    November 25, 2013 Network Box USA

    Is open source encryption the answer to NSA snooping?

    When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to …

    November 14, 2013 Pierluigi Stella

    Evaluating Einstein DHS 3

    From what I’ve gathered, based on reading the various articles and interviews found on the web on Einstein DHS 3, …

    November 14, 2013 Pierluigi Stella

    C is for CryptoLocker

    CB Insight There’s been a lot of talk about the CryptoLocker lately, as though it’s something new or unique.  Sorry to …

    October 31, 2013 Network Box USA

    Can Snowden revert privacy to a social norm?

    SEATTLE – The steady trickle of revelations of government snooping that continues to seep from the Edward Snowden documents is …

    October 29, 2013 Network Box USA

    Windows XP users six times more likely to be hacked

    SEATTLE – Microsoft’s venerable Windows XP operating is six times more likely to be successfully hacked than newer Windows 7 …

    October 29, 2013 Network Box USA

    6 Dirty Secrets of the IT Industry

    By Dan Tynan InfoWorld — IT pros usually know where the bodies are buried. Sometimes that’s because they’re the ones holding the …

    September 12, 2013 Network Box USA

    Federal DDoS Warnings Are Outdated

    It’s always the same: Government cybersecurity experts learn of pending distributed denial of service attacks, especially around the anniversary of …