2016 Information Security New Year’s Resolutions

Peter Silva

In this video, Peter Silva, Technical Marketing Manager at F5 Networks list the top five information security new year’s resolutions for improving cyber security in 2016. [su_box title=”About Peter Silva” style=”noise” box_color=”#336588″]Peter is an F5 evangelist for security, IoT, mobile and core. His background in theatre brings the slightly theatrical and fairly technical together to cover […]

“Sorting out the Confusing Endpoint Security Market”

Endpoint Security Market

[su_box title=”About K logix” style=”noise” box_color=”#336588″]K logix provide security consulting and technology integration to enterprise companies. K logix experienced team and our established process help organizations make confident security decisions that impact their business goals.[/su_box]

Google Stops Supporting SHA-1 Certificates

Google Stops Supporting SHA-1 Certificates

Google has announced that its Chrome browser will stop supporting SHA-1 certificates by 2017. Google hasn’t had confidence in SHA-1’s — the algorithm used for encryption by most SSL certificates, which add the “s” to https:// — ability to keep your information safe for a long time. Prof. Michael Scott, Chief Cryptographer and Co-Founder of […]

Infiltration by Design

Infiltration by Design

Major data breaches make headlines too frequently, reinforcing the fact that even if organizations deploy top of the line security products, threat agents can still find a way to infiltrate. By bypassing common security solutions, there are four standard ways attackers can still “Infiltrate by Design”: Leveraging Design Vulnerabilities: An attacker can leverage an unexpected […]