January 31, 2019 Pierluigi Stella

Thriving in the Era of Cyberattacks

When we say cybersecurity, we immediately think hackers, spam, phishing, rogue nations, Nigerian scams, and the likes.  Our mind automatically …

read more
January 23, 2019 D. Nour Dandan

Old Passwords for Sale: May Still Work

Last week, Troy Hunt, a security researcher who runs Have I Been Pwned, reported finding an 87GB file of 773M …

read more
January 10, 2019 Pierluigi Stella

When Does Security Become Too Much?

Is there even such a thing as too much cyber security? And can it be counterproductive? In my opinion the …

read more
December 19, 2018 D. Nour Dandan

Healthcare, Compliance, and Email Security

Email, without question, is the most efficient way to communicate information quickly and accurately. However, transmitting confidential patient data electronically …

read more
December 12, 2018 Pierluigi Stella

Predicting 2019

Every year, come rain or shine, when the month of December rolls around, someone will inevitably ask me, “What do …

read more


Get updates from Network Box USA

Enter your email address to receive news and insights from us.

All latest news

March 11, 2016 Network Box USA

5 Cybersecurity Trends at RSA Conference

Bank Info Security by Mathew J Schwartz This year is notable on multiple fronts: It’s the conference’s 25th anniversary, parts of the …

March 03, 2016 Network Box USA

Network Box USA honored with multiple wins at recently concluded 12th Annual 2016 Info Security PG’s Global Excellence Awards® Event

Winners of the Security Industry’s Coveted Global Excellence Awards were feted by Info Security Products Guide in San Francisco Houston, TX, March …

February 25, 2016 Network Box USA

Using public WiFi like posting on a billboard

Many people are also fooled into using fake WiFi hotspots in airports, notes Pierluigi Stella, chief technical officer for Network Box …

February 18, 2016 Pierluigi Stella

The Harvard Report on Encryption

Very interesting survey indeed. It’s especially important to highlight that when you put in a government mandated backdoor, the only ones …

January 14, 2016 Pierluigi Stella

The Exposed Backdoor Code

https://www.scmagazine.com/fortinet-denies-claims-that-remote-access-vulnerability-was-backdoor/article/530077/ “This was not a backdoor vulnerability but rather a management authentication issue” per statement issued by Fortinet representatives. OK, how does …

October 29, 2015 D. Nour Dandan

[Infographic] Did you know …

October 07, 2015 Network Box USA

Experian breach hits 15mil T-Mobile customers

Experian, a vendor which processes T-Mobile’s credit applications, has been breached, putting 15 million T-Mobile customers at risk. Innocent users …

September 30, 2015 Pierluigi Stella

On Microsoft Azure’s New Solutions

I invite you to click here and read the press statement issued by Microsoft Azure yesterday, on releasing market-leading innovations …

September 28, 2015 Pierluigi Stella

Further Thoughts On BYOD Policies

Personally, I’ve been against BYOD from the onset, and, to this day, I remain firm in my position.  Even when …

September 25, 2015 Pierluigi Stella

On Cyber Crime & Cyber Terrorism, Conclusion

So previously, in Part 1, we talked about the state of security today, and how, I feel, it is somewhat …