January 31, 2019 Pierluigi Stella

Thriving in the Era of Cyberattacks

When we say cybersecurity, we immediately think hackers, spam, phishing, rogue nations, Nigerian scams, and the likes.  Our mind automatically …

read more
January 23, 2019 D. Nour Dandan

Old Passwords for Sale: May Still Work

Last week, Troy Hunt, a security researcher who runs Have I Been Pwned, reported finding an 87GB file of 773M …

read more
January 10, 2019 Pierluigi Stella

When Does Security Become Too Much?

Is there even such a thing as too much cyber security? And can it be counterproductive? In my opinion the …

read more
December 19, 2018 D. Nour Dandan

Healthcare, Compliance, and Email Security

Email, without question, is the most efficient way to communicate information quickly and accurately. However, transmitting confidential patient data electronically …

read more
December 12, 2018 Pierluigi Stella

Predicting 2019

Every year, come rain or shine, when the month of December rolls around, someone will inevitably ask me, “What do …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


All latest news

August 05, 2016 Pierluigi Stella

Why You Need A WAF – Part 2

Previously, we touched on the critical value of protecting one’s web server, and the various way to do just that such …

August 03, 2016 Pierluigi Stella

Why You Need A WAF – Part 1

At the time of writing of this blog, attacks against web servers are (by far) the most prevalent issue in …

July 13, 2016 D. Nour Dandan

Fear, Urgency, and Doubt: The FUD of Social Engineering

Having worked in the cybersecurity sector for 5 years, I’ve become quite the skeptic when it comes to unsolicited phone …

June 29, 2016 D. Nour Dandan

Cost of Cybersecurity – Part 3

In our previous blog entries, we examined the costs of personnel and technology when it comes to cybersecurity. In today’s entry, we’ll go …

June 22, 2016 D. Nour Dandan

Cost of Cybersecurity – Part 2

We covered the cost of hiring cybersecurity experts in our previous blog entry.  Today, we take a dive into the …

June 15, 2016 D. Nour Dandan

Cost of Cybersecurity – Part 1

When discussing cybersecurity expenses, we often find ourselves talking about the cost of cybercrime – or cybersecurity after the fact. …

June 15, 2016 Network Box USA

Report: Russia’s ‘Best’ Hackers Access DNC’s Trump Research

Bank Info Security Written by Eric Chabrow Pierluigi Stella, chief technology officer at managed security services provider Network Box USA, offers a …

May 24, 2016 Pierluigi Stella

Bottom line of LinkedIn Hack: Step Up Your security

The sheer idea of hacking into a network and stealing data is based on being stealthy. Hackers are really good …

May 19, 2016 Network Box USA

Cybersecurity Experts Comment on LinkedIn Data Breach

Information Security Buzz “The sheer idea of hacking and stealing data is based on being stealth and hackers are really good …

April 25, 2016 Network Box USA

Most orgs couldn’t quickly detect breach, study

A recent survey found that only 21 percent of 209 respondents from an Osterman Research panel said they were able …