This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Space Weather Outlook August 29, 2016 at 01:33AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-35 2016 August 28 at 11:18 p.m. MDT (2016 August 29 0518 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 22-28 G1 (Minor) geomagnetic storm levels were observed on 23 and 24 August due to coronal hole high speed stream activity. Outlook For August 29-September 4 G1 (Minor) geomagnetic storm levels are likely on 29-30 August due to recurrent coronal hole high speed stream activity. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Space Weather Outlook August 22, 2016 at 01:43AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-34 2016 August 21 at 11:29 p.m. MDT (2016 August 22 0529 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 15-21 No space weather storms were observed during the summary period. Outlook For August 22-28 No space weather storms are expected for the forecast period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

The Cyber Threat Risk - Oversight Guidance for CEOs and Boards

The following is external content provided as a free resource for blog readers.
The time has come for CEOs and Boards to take personal responsibility for improving their companies' cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, and corporate leaders will have to step up accordingly.

Request Free!

Gartner Magic Quadrant for Security Information and Event Management (SIEM)

The following is external content provided as a free resource for blog readers.
Advanced users are looking to augment SIEM with advanced profiling and analytics. The Security Information and Event Management (SIEM) market is defined by the customer's need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

Request Free!

Gartner Names Box a Leader 3 Years in a Row

The following is external content provided as a free resource for blog readers.
Since 2005, Box has helped over 62,000 customers address content management challenges and transform the way they work. Box provides a user-friendly collaboration tool for employees with the security, controls and compliance every enterprise needs.

The 2016 Gartner Magic Quadrant can help your organization:
  • Get educated about which EFSS solutions are best for your business
  • Narrow down your search of tools to short list or demo selections
  • Evaluate vendors that fit your needs and business goals
Download the Gartner 2016 Magic Quadrant now.

Request Free!

IT's Guide for Securing and Managing Business Content

The following is external content provided as a free resource for blog readers.
Customers are turning to cloud solutions since most traditional on-premise solutions haven't been able to solve the evolving needs of organizations. In this eBook, you'll learn how using Box and Office 365 together enables customers to produce content using Office 365 and securely manage it using Box so that customers can collaborate and work from anywhere, seamlessly between apps.

Request Free!

Box + Microsoft - Together We Mean Business

The following is external content provided as a free resource for blog readers.
These customers use integrations between Box and Office to collaborate on content from all of their devices. Watch this webinar to learn how you can use Box and Office 365 together and hear firsthand from a customer who uses Box and Office 365 together every day to successfully and securely manage their content.

Request Free!

How Good Collaboration Tools Can Elevate IT's Role

The following is external content provided as a free resource for blog readers.
Instead of being the folks hidden away in a back room dealing with infrastructure management, employee help tickets and security risks, IT has the opportunity to create applications and services that will have a greater impact on the company's bottom line. When you listen to what your users want and need to collaborate in the workplace, the result is a more secure system, lower usage of unsanctioned collaboration tools and a better reputation for your entire IT department.

Request Free!

Gartner + Box O365: Make a Smart Investment in Office 365 Smarter

The following is external content provided as a free resource for blog readers.
However, there are limitations to Office 365 that you should be aware of as you consider using Office 365 for your content management needs and moving to the cloud. This Gartner newsletter outlines five common limitations that users can encounter when using Office 365 to manage content, including SharePoint and OneDrive.

Request Free!

Space Weather Outlook August 14, 2016 at 08:37PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-33 2016 August 14 at 6:23 p.m. MDT (2016 August 15 0023 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 8-14 No significant space weather was observed during the summary period. Outlook For August 15-21 G1 (Minor) geomagnetic storming is likely on 16 August due to effects from a recurrent, negative polarity CH HSS. No other significant space weather is expected during the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Securing Your Private Keys As Best Practice for Code Signing Certificates

The following is external content provided as a free resource for blog readers.
Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.

Request Free!

To Increase Downloads Instill Trust First

The following is external content provided as a free resource for blog readers.
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

Request Free!

Symantec Code Signing, an Essential Security Feature to Add to Your Software

The following is external content provided as a free resource for blog readers.
Distributing your software through online and wireless channels brings substantial benefits: You can save money, get your code out faster, and bypass the inventory and fulfillment constraints of shipping out discs and getting space on retailers' shelves. But how can you make best use of those digital channels to circulate your code as widely as possible?

Request Free!

On-Demand, Always-On, or Hybrid?

The following is external content provided as a free resource for blog readers.
Radware's 2015-2016 Global Application and Network Security Report revealed that over 50% of organizations have experienced some type of DDoS attack in 2015.

Cyberattacks are evolving at a blinding pace, leaving organizations vulnerable and unprepared. Fortunately, there are solutions that not only address these threats but also meet the specific needs of organizations searching for a DDoS solution. Whether it's an on-demand, always-on, or hybrid solution, each approach has its own benefits and challenges.

Download this white paper to find out what the best option is for your organization.

Request Free!

Data Protection and the Insider Threat

The following is external content provided as a free resource for blog readers.

User and Entity Behavior Analytics has emerged as a critical part of a robust information security strategy, enabling the detection of threats that would otherwise go undetected. Gain understanding of the UEBA marketplace, and of the Veriato approach and how it can benefit your organization.



Request Free!

Conversational User Behavior Analytics

The following is external content provided as a free resource for blog readers.

What is User Behavior Analytics? Shortly after the dawn of shared computing, User Behavior Analytics, another interesting phenomenon developed: insider threats. New defenses have evolved to help combat the danger within the perimeter. 



Request Free!

Implementing a User Activity and Behavior Monitoring Program

The following is external content provided as a free resource for blog readers.

Security & Risk professionals recognize the value and benefits of analyzing user behavior and monitoring user activity. At times, legal and HR staff have questions that must be addressed prior to implementation. This document is intended to assist company executives determining how to best implement a user activity monitoring and / or user behavior analytics program.



Request Free!

Keeping Hires From Starting Fires

The following is external content provided as a free resource for blog readers.

The fact that trusted employees or contractors often create problems for the organizations they work for, is unfortunate, but remains a fact. But why? Companies take steps to protect themselves against the risks that are inherent when bringing in new people. Interviews, background checks, reference checks, etc., are all designed to mitigate risk. Unfortunately, it’s never enough. This White Paper will present some common sense suggestions for improving the “beginning of the life cycle” risk mitigation process.



Request Free!

Space Weather Outlook August 07, 2016 at 08:42PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-32 2016 August 7 at 6:23 p.m. MDT (2016 August 8 0023 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 1-7 G1 (Minor) geomagnetic storm conditions were observed on 02-03 August due to CME shock enhancements coupled with effects from a recurrent, positive polarity CH HSS. R1 (Minor) radio blackouts were observed on 07 August due to flare activity from an active region just beyond the SW limb. Outlook For August 8-14 G1 (Minor) geomagnetic storm conditions are likely on 08 August due to recurrent CH HSS activity. There is a chance for R1-R2 (Minor-Moderate) radio blackouts through the outlook period due to the flare potential from new Regions 2573 and 2574. These regions just rotated onto the east limb and appear to be the return of old active Regions 2565 and 2567 which produced R1-R2 radio blackouts on their previous transit. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Security Now: Essentials for IT Defense (eBook Kit, a $50 Value)

The following is external content provided as a free resource for blog readers.
As more and more data is moved into virtual environments the need to secure it becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals this kit offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. Use this knowledge to protect yourself and your business, today!

The following kit contents will help you continue your research on IT Security:
  • Securing the Virtual Environment: How to Defend the Enterprise Against Attack
  • Ransomware Hostage Rescue Manual for IT Pros
  • Mobile Security Challenges & Concerns in a BYOD Enterprise
  • 4 Best Practices for Monitoring Cloud Infrastructure You Don't Own


Request Free!

Securing the Virtual Environment: How to Defend the Enterprise Against Attack (Valued at $50)

The following is external content provided as a free resource for blog readers.

As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts.

This offer expires on 8/19.



Request Free!

Space Weather Outlook July 31, 2016 at 09:08PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #16-31 2016 July 31 at 6:52 p.m. MDT (2016 August 1 0052 UTC) **** SPACE WEATHER OUTLOOK **** Summary For July 25-31 No significant space weather was observed during the summary period. Outlook For August 1-7 R1 (Minor) to R2 (Moderate) radio blackouts are possible after 05 August due to the return of active Regions 2565 and 2567. On their previous transit, both of these regions produced R1 and R2 activity. G1 (Minor) geomagnetic activity is likely on 02 and 03 August due to CH HSS activity. G2 (Moderate) geomagnetic activity is likely on 02 August due to the expected arrival of the 28 July CME. Activity from this CME will contribute to the expected CH HSS activity. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.