May 30, 2018 D. Nour Dandan

Keeping Up in a Dynamic World: Moving to the Cloud

In previous blog entries, we identified two roadblocks around technology obsolescence and discussed the importance of real-time, push updates. Today, …

read more
June 07, 2018 D. Nour Dandan

Keeping Up in a Dynamic World: Outsourcing Cybersecurity Management

Previously, we explored the option of moving cybersecurity to the cloud as one strategy to end the hardware chase. Today, …

read more
May 22, 2018 D. Nour Dandan

Keeping Up in a Dynamic World: Real-Time Threat Protection

In the previous blog entry, we looked at the roadblocks surrounding technology obsolescence. Before delving into strategies (e.g. moving to …

read more
May 16, 2018 D. Nour Dandan

Keeping Up in a Dynamic World: The Roadblocks

Every year since 2007, Apple has released a new iPhone model (and iOS upgrade) that leverages faster and, at times, …

read more
December 07, 2017 Pierluigi Stella

Cybersecurity Pros Deserve a Spot on Company Boards: A Response Thereto

A while back, I wrote that it is time for companies to start treating cyber security the way processing plants …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


All latest news

March 03, 2016 Network Box USA

Network Box USA honored with multiple wins at recently concluded 12th Annual 2016 Info Security PG’s Global Excellence Awards® Event

Winners of the Security Industry’s Coveted Global Excellence Awards were feted by Info Security Products Guide in San Francisco Houston, TX, March …

February 25, 2016 Network Box USA

Using public WiFi like posting on a billboard

Many people are also fooled into using fake WiFi hotspots in airports, notes Pierluigi Stella, chief technical officer for Network Box …

February 18, 2016 Pierluigi Stella

The Harvard Report on Encryption

Very interesting survey indeed. It’s especially important to highlight that when you put in a government mandated backdoor, the only ones …

January 14, 2016 Pierluigi Stella

The Exposed Backdoor Code

https://www.scmagazine.com/fortinet-denies-claims-that-remote-access-vulnerability-was-backdoor/article/530077/ “This was not a backdoor vulnerability but rather a management authentication issue” per statement issued by Fortinet representatives. OK, how does …

October 29, 2015 D. Nour Dandan

[Infographic] Did you know …

October 07, 2015 Network Box USA

Experian breach hits 15mil T-Mobile customers

Experian, a vendor which processes T-Mobile’s credit applications, has been breached, putting 15 million T-Mobile customers at risk. Innocent users …

September 30, 2015 Pierluigi Stella

On Microsoft Azure’s New Solutions

I invite you to click here and read the press statement issued by Microsoft Azure yesterday, on releasing market-leading innovations …

September 28, 2015 Pierluigi Stella

Further Thoughts On BYOD Policies

Personally, I’ve been against BYOD from the onset, and, to this day, I remain firm in my position.  Even when …

September 25, 2015 Pierluigi Stella

On Cyber Crime & Cyber Terrorism, Conclusion

So previously, in Part 1, we talked about the state of security today, and how, I feel, it is somewhat …

September 23, 2015 Pierluigi Stella

On Cyber Crime & Cyber Terrorism, Part 1

The general issue of security needs to be put into proper perspective – anything made by humans can, and will …