hotbrick - logo

Firewall Hardware Internet security,Firewall, network Security, VPN, virtual private network, firewall security. Hot Stones.

Top 10 Ways to Reduce the Risk of Data Leakage

25/05/2016 - Data is arguably the most important asset in any organization. The implications of corporate data getting into the wrong hands could potentially be catastrophic. This document is going to give you some hopefully useful tips to help you protect yourself against the risks of data leakage.

Application Security Redux: It’s All About The Apps (Part 3)

18/05/2016 - In this Part 3 we’ll discuss how you can block undesirable applications and restrict what users are able to do with the apps that you do allow them to use.

Application Security Redux: It’s All about the Apps (Part 2)

11/05/2016 - In this Part 2, we’re going to start with a look at how to protect applications from tampering or access and also take a closer look at the special case of mobile applications.

Prioritise Your Security Controls - Protect, Detect And Remediate (Part 2)

04/05/2016 - This article will focus on the further requirement for detection and remediation once an attack has occurred.

Application Security Redux: It’s All about the Apps (Part 1)

27/04/2016 - In this article series, we'll begin with a broad overview of application security, how it's evolved, and why it's so important. Then we'll get more specific and talk about the components of an application security plan and different ways to accomplish the goals that you set.