February 28, 2022 Pierluigi Stella

AI & Cybersecurity

Something I keep hearing of late is what cybersecurity is set to look like this year (and beyond), as well …

read more
August 03, 2016 Pierluigi Stella

Why You Need A WAF – Part 1

At the time of writing of this blog, attacks against web servers are (by far) the most prevalent issue in …

read more
November 28, 2018 Sheela Goh

How I Protect My Personal Data From Cyber Threats

I’ve resisted writing for the blog for almost six years now, for the simple reason that I simply did not …

read more
June 11, 2021 Sheela Goh

SIEM & Logs To Collect

As we increasingly deploy the SIEM within client networks, we're learning some good lessons. Generally, there seems to be a misunderstanding …

read more
March 04, 2020 Pierluigi Stella

How A SIEM Keeps Watch, Like Big Brother, But Over Your Network – Part I

Since 2000, our sole agenda is to provide Enterprise class perimeter security defense to the SMB market.  For two decades, …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


    All latest news

    March 11, 2016 Network Box USA

    5 Cybersecurity Trends at RSA Conference

    Bank Info Security by Mathew J Schwartz This year is notable on multiple fronts: It’s the conference’s 25th anniversary, parts of the …

    March 03, 2016 Network Box USA

    Network Box USA honored with multiple wins at recently concluded 12th Annual 2016 Info Security PG’s Global Excellence Awards® Event

    Winners of the Security Industry’s Coveted Global Excellence Awards were feted by Info Security Products Guide in San Francisco Houston, TX, March …

    February 25, 2016 Network Box USA

    Using public WiFi like posting on a billboard

    Many people are also fooled into using fake WiFi hotspots in airports, notes Pierluigi Stella, chief technical officer for Network Box …

    February 18, 2016 Pierluigi Stella

    The Harvard Report on Encryption

    Very interesting survey indeed. It’s especially important to highlight that when you put in a government mandated backdoor, the only ones …

    January 14, 2016 Pierluigi Stella

    The Exposed Backdoor Code

    https://www.scmagazine.com/fortinet-denies-claims-that-remote-access-vulnerability-was-backdoor/article/530077/ “This was not a backdoor vulnerability but rather a management authentication issue” per statement issued by Fortinet representatives. OK, how does …

    October 29, 2015 D. Nour Dandan

    [Infographic] Did you know …

    October 07, 2015 Network Box USA

    Experian breach hits 15mil T-Mobile customers

    Experian, a vendor which processes T-Mobile’s credit applications, has been breached, putting 15 million T-Mobile customers at risk. Innocent users …

    September 30, 2015 Pierluigi Stella

    On Microsoft Azure’s New Solutions

    I invite you to click here and read the press statement issued by Microsoft Azure yesterday, on releasing market-leading innovations …

    September 28, 2015 Pierluigi Stella

    Further Thoughts On BYOD Policies

    Personally, I’ve been against BYOD from the onset, and, to this day, I remain firm in my position.  Even when …

    September 25, 2015 Pierluigi Stella

    On Cyber Crime & Cyber Terrorism, Conclusion

    So previously, in Part 1, we talked about the state of security today, and how, I feel, it is somewhat …