Default HubSpot Blog

Network monitoring a new, widespread focus

Posted by Aoife McMonagle on Mar 3, 2015 12:08:01 PM

Data encryption, firewalls and other traditional IT security fortifications certainly remain important in the grand scheme of information and system protection, but they no longer tell the full story of what needs to be done to keep a company safe. Rather, these pieces of software are critically important to act as safeguards for data at rest and in motion, but the real movement taking place in the security community relates back to network monitoring and management. 

Read More

Topics: Network Security

When will the IoT become a reality?

Posted by Aoife McMonagle on Mar 3, 2015 12:07:53 PM

The Internet of Things has no doubt taken up a wealth of corporate conversations in the past year or so, but many are still wondering when the trend will actually erupt onto the scene and transform operations. Because of the heightened level of competition between device manufacturers and IT giants, it only makes sense that the reality of the IoT is now beginning to take shape and gain traction, forcing companies to prepare accordingly. 

Read More

Topics: Network Security

When will the IoT become a reality?

Posted by Aoife McMonagle on Feb 24, 2015 1:07:22 PM

The Internet of Things has no doubt taken up a wealth of corporate conversations in the past year or so, but many are still wondering when the trend will actually erupt onto the scene and transform operations. Because of the heightened level of competition between device manufacturers and IT giants, it only makes sense that the reality of the IoT is now beginning to take shape and gain traction, forcing companies to prepare accordingly. 

Read More

Topics: Network Security

Network monitoring a new, widespread focus

Posted by Aoife McMonagle on Feb 3, 2015 2:07:16 PM

Data encryption, firewalls and other traditional IT security fortifications certainly remain important in the grand scheme of information and system protection, but they no longer tell the full story of what needs to be done to keep a company safe. Rather, these pieces of software are critically important to act as safeguards for data at rest and in motion, but the real movement taking place in the security community relates back to network monitoring and management. 

Read More

Topics: Network Security

The Cyber Security Readiness of Canadian Organizations (Infographic)

Posted by Aoife McMonagle on Feb 3, 2015 8:24:00 AM

Our 2015 Security Study, The Cyber Security Readiness of Canadian Organizations, surveyed over 600 IT security professionals in Canada. We wanted to study how Canadian organizations are responding to cyber security threats and what technologies and tactics lead to organizations obtaining a stronger security posture. Our infographic below outlines some of the key findings from the report. If you'd like to download a free copy of the complete report, you can do so by clicking here.

Read More

Topics: Network Security, IT Security, Infographic, Security

2015 Resolutions for Information Security Professionals

Posted by Aoife McMonagle on Jan 6, 2015 9:12:00 AM

 

Read More

Topics: Network Security, IT Security, Security

On the ninth day of security: Security through perpetual monitoring

Posted by Aoife McMonagle on Dec 22, 2014 9:10:57 AM

This is the ninth installment of our 12 Days of Security series.

Read More

Topics: Network Security

Another potential application of big data

Posted by Aoife McMonagle on Nov 25, 2014 2:07:18 PM

Information analytics have become commoditized in recent years, with organizations in a wealth of industries and of varying sizes deploying big data technology to become more intelligent in the decision-making process. Although these technologies were once only popular for marketing and brand management strategies - at least among new adopters - the rules of engagement have changed substantially now that leaders have a greater understanding of how the tools work and what they can be used to accomplish. 

Read More

Topics: Network Security

Another potential application of big data

Posted by Aoife McMonagle on Nov 25, 2014 9:07:16 AM

Information analytics have become commoditized in recent years, with organizations in a wealth of industries and of varying sizes deploying big data technology to become more intelligent in the decision-making process. Although these technologies were once only popular for marketing and brand management strategies - at least among new adopters - the rules of engagement have changed substantially now that leaders have a greater understanding of how the tools work and what they can be used to accomplish. 

Read More

Topics: Network Security

Network monitoring, security in high demand

Posted by Aoife McMonagle on Nov 24, 2014 5:07:26 PM

Data security practices have been in a perpetual state of flux throughout the past several years, and many companies have focused all of their budgets and attention on the protection of information from exposure and theft. While this is all well and good, decision-makers cannot forget the importance of defending networks and infrastructure from threats, outages, disruptions and other problems, as these systems are just as sensitive as the data they contain. 

Read More

Topics: Network Security