February 28, 2022 Pierluigi Stella

AI & Cybersecurity

Something I keep hearing of late is what cybersecurity is set to look like this year (and beyond), as well …

read more
August 03, 2016 Pierluigi Stella

Why You Need A WAF – Part 1

At the time of writing of this blog, attacks against web servers are (by far) the most prevalent issue in …

read more
November 28, 2018 Sheela Goh

How I Protect My Personal Data From Cyber Threats

I’ve resisted writing for the blog for almost six years now, for the simple reason that I simply did not …

read more
June 11, 2021 Sheela Goh

SIEM & Logs To Collect

As we increasingly deploy the SIEM within client networks, we're learning some good lessons. Generally, there seems to be a misunderstanding …

read more
March 04, 2020 Pierluigi Stella

How A SIEM Keeps Watch, Like Big Brother, But Over Your Network – Part I

Since 2000, our sole agenda is to provide Enterprise class perimeter security defense to the SMB market.  For two decades, …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


    All latest news

    November 07, 2018 Pierluigi Stella

    It Could Happen to Anyone

    On Friday, 2nd November 2018, I received an email from the mailbox of one of our resellers (see below), inviting …

    June 07, 2018 D. Nour Dandan

    Keeping Up in a Dynamic World: Outsourcing Cybersecurity Management

    Previously, we explored the option of moving cybersecurity to the cloud as one strategy to end the hardware chase. Today, …

    May 30, 2018 D. Nour Dandan

    Keeping Up in a Dynamic World: Moving to the Cloud

    In previous blog entries, we identified two roadblocks around technology obsolescence and discussed the importance of real-time, push updates. Today, …

    May 22, 2018 D. Nour Dandan

    Keeping Up in a Dynamic World: Real-Time Threat Protection

    In the previous blog entry, we looked at the roadblocks surrounding technology obsolescence. Before delving into strategies (e.g. moving to …

    May 16, 2018 D. Nour Dandan

    Keeping Up in a Dynamic World: The Roadblocks

    Every year since 2007, Apple has released a new iPhone model (and iOS upgrade) that leverages faster and, at times, …

    January 29, 2018 D. Nour Dandan

    Healthcare Data Breaches (2010 – 2017)

    Healthcare is one of the most heavily targeted industries when it comes to cyber attacks. In the infographic below, we …

    January 08, 2018 D. Nour Dandan

    2017’s Top 10 Ransomware Attacks

    Ransomware has been and continues to be front-of-mind. In the infographic, we take a look at 2017's Top 20 Ransomware …

    December 07, 2017 Pierluigi Stella

    Cybersecurity Pros Deserve a Spot on Company Boards: A Response Thereto

    A while back, I wrote that it is time for companies to start treating cyber security the way processing plants …

    November 15, 2017 Pierluigi Stella

    Pen Testing

    One of the pillars of security prevention measure, call it due diligence, if you prefer, is the so called “pen …

    November 10, 2017 D. Nour Dandan

    Ransomware: The Silver Lining

    Ransomware continues to be a significant threat to organizations worldwide.  News coverage has brought it to the forefront of cybersecurity …