
Posted: January 11, 2023
Sometimes you realize it just a split-second too late. A wave of terror passes over you as you wonder, What did I just click? I think I’ve really messed up! If this sounds familiar to […]

Posted: June 14, 2022
If asked which of the threat types tracked by the FBI causes the most financial damage, most people would say ransomware. They’d be wrong. In 2021, the FBI’s Internet Crime Complaint Center (IC3) received 19,954 […]

Posted: May 19, 2022
Within the last 30 days, data breaches at nearly 40 healthcare organizations across 20 U.S. states compromised almost 1.8 million individual records, according to the U.S. Department of Health and Human Services (HHS). Unfortunately, this […]

Posted: June 29, 2021
If you’re planning to onboard multiple branches or refresh existing sites with newer firewalls, SonicWall now offers options to help you effortlessly fast-track the process. We recently announced the expansion of our Network Security Manager […]

Posted: November 5, 2020
Recently, I published a blog introducing our fresh new SaaS-based centralized firewall manager, SonicWall Network Security Manager (NSM) version 2.0. If you haven’t yet read it, I encourage you to do so; it highlights the […]

Posted: August 12, 2020
As your organization expands, the need for rapid deployment of firewalls and other security services underscores the importance of unified security management — particularly if you’re a large, distributed enterprise or MSSP. Meanwhile, managing firewall […]

Posted: March 6, 2020
I clienti che hanno a cuore la sicurezza si trovano a dover affrontare scelte complesse quando si tratta di valutare i fornitori di sicurezza e le offerte dei firewall di prossima generazione. Per semplificare questo […]

Posted: February 20, 2020
Security-conscious customers face tough choices when evaluating security vendors and their next-generation firewall offerings. To simplify this process and improve transparency in the cybersecurity market, NetSecOPEN announces SonicWall is one of only four security vendors […]

Posted: December 13, 2019
Organizations continue to be alarmed by how easily cybercriminals can circumvent security defenses as malware, ransomware, cryptojacking and phishing attacks make headline news. In addition, security operations lack visibility and awareness of unsafe network and […]

Posted: November 14, 2018
Modern organizations understand the criticality of having the best possible cyber defense to defend against malicious actions of skillful cybercriminals. Most firms today employ various cybersecurity tools designed to help prevent inevitable attacks from wreaking […]

Posted: October 24, 2018
When it comes to running a well-organized managed security service business, managed security providers (MSP) demand effective, repeatable processes and continuous operation optimization as a key part of their business strategy. Evaluating and deciding on […]

Posted: June 27, 2018
For many organizations, the fear of being targeted by cybercriminals runs deep, especially as news of the latest high-profile cyberattacks dominate the headlines. Managing security and responding to cyber risks and events are major issues […]

Posted: June 26, 2018
We have fantastic advancements in technologies right now. With software-defined everything (SDx) and cloud becoming more accessible and affordable, both large and small organizations can effectively execute their digital business strategies with greater ease and […]

Posted: April 12, 2018
With the number of attempted web attacks ranging up to millions over the course a year, you need to ensure web application security. You need a solution that protects both your public and internal web […]

Posted: April 12, 2018
To keep pace with innovations and modernize data center operations and services, businesses are embracing today’s application-centric, virtualized world. Virtualization and cloud can cut costs and increase efficiency and operational agility. Four common pitfalls of […]

Posted: March 20, 2018
Since the shocking announcement of serious Meltdown and Spectre vulnerabilities in early 2018, we have yet to hear of a mega-breach that would signal the start of another vicious hacking year. Has it been luck? […]

Posted: September 28, 2017
Keeping organizations running safely, while improving business and user productivity in today’s accelerating threat environment, continues to be a non-trivial task for IT leaders. At the current pace of cyber attacks, we understand all too […]

Posted: July 25, 2017
The earliest schemes of cryptography, such as substituting one symbol or character for another or changing the order of characters instead of changing the characters themselves, began thousands of years ago. Since then, various encoding […]

Posted: May 24, 2017
Some consider WannaCry to be the first-ever, self-propagating ransomware attack to wreak havoc across the globe. The chaos that followed is yet another harsh wake-up for many, in a situation far too familiar. Only this […]

Posted: April 4, 2017
Times are extremely restless for security teams as they face highly motivated adversaries, and the onslaught of very active and progressive cyber-attacks. Today’s hacking techniques are stealthy, unpredictable in nature and waged by skillful attackers […]

Posted: April 3, 2017
There is no end to the danger of cyber-criminal activities, as long as there is an underground marketplace that makes it almost impossible for authorities to intervene and enforce law and order. We continue to […]

Posted: December 16, 2016
Preventing your organization from being the victim of an inevitable cyber-attack is paramount so it is important for us to kick off this blog with an important risk question. Do you know whether or not […]

Posted: November 4, 2016
The recently publicized Distributed Denial of Service (DDoS) attacks on the Domain Name System (DNS) service provider Dyn involved large numbers of IoT (Internet of Things) botnets. These attacks took many high traffic websites such […]

Posted: August 6, 2016
It can be tough to balance your personal life with work when your work is in network security. In my last post, I described how difficult it is for us in IT to defend against […]

Posted: July 2, 2016
The popularity and use of ransomware appear to be spreading at record pace in 2016 as cybercriminals are actively using ransomware to hold businesses, institutions and even individuals hostage. No one is immune to this […]

Posted: March 14, 2016
The hacking economy continues to thrive. As you can see for the timeline chart below, we have seen data breach headlines in every industry verticals regardless of their size. Cyber-criminals made the most of their […]

Posted: February 18, 2016
Two days ago, Google published a blog revealing the latest critical vulnerability (CVE-2015-7547) that affects all versions of a standard GNU C Library (glibc), a big component of Enterprise Linux, which is used widely in […]

Posted: February 1, 2016
Every moment of every day, anyone or any organization, government or institution – including K-12 – can fall victim to the latest threats and cyber-attacks. If you’re accountable for the network security of an entire […]

Posted: January 27, 2016
Living the life of a chief security officer (CSO), chief information security officer (CISO) or any title with the word “security” in it nowadays is surely a heart-wrenching experience each day. Far too often, yet […]

Posted: October 6, 2015
As an IT leader, you understand how new disruptive technologies can improve your company’s competitive positioning and drive overall business value. Technology trends such as cloud, mobility, social and big data compel companies to move […]

Posted: August 18, 2015
I returned to Las Vegas earlier this month to attend the Black Hat USA 2015 hacker conference where I learned about the latest and most shocking vulnerabilities discovered by security researchers from around the world. […]

Posted: July 6, 2015
The SonicWall Security Threat Research team sifts through hundreds of thousands of unique malware samples daily. In their latest threat report, they’ve documented that businesses continue to be under attack in ways that are increasingly […]

Posted: May 26, 2015
No one needs reminding that 2014 was one of the most profitable years for cyber-criminals. The timeline graphic below takes us back to memory lane of what happened to large retailers such as Target, Home […]

Posted: May 6, 2015
On April 20, 2015, Info Security Products Guide, the industry’s leading information security research and advisory guide, announced the winners for its 11th Annual Info Security 2015 Global Excellence Awards. These prestigious global awards recognize […]

Posted: April 27, 2015
According to a recent Gartner report1, encrypted web traffic now comprises up to 40 percent of total web traffic for financial institutions. NSS Labs2 estimated 25 percent to 35 percent for a typical enterprise. However, […]