The Driving Forces in Cyberspace are Changing the Reality of Security
The Time, Space, Anonymity, Asymmetry, Efficiency formula is fundamental to understanding conflict and power in cyberspace – and key to understanding how to strategically plan security against cyber...
View ArticleStonesoft awarded by NSS Labs at RSA 2013
Triple play! NSS Labs' "Recommended" awards for Stonesoft FW, NGFW and IPS handed over at RSA 2013
View ArticleStonesoft drowns firewall at RSA
For some deployments Next Generation means going beyond security capabilities and into the physical realm. At RSA Stonesoft is showing the new MIL-320 and you can see just how much punishment it can...
View ArticleBalancing on the tightrope of digital opportunities and security
Organizations need balanced cyber strategies to enable them to reap the rewards of new digital opportunities, while keeping the negatives under control. For decision-makers, taking a top-down,...
View ArticleTen tips for implementing Next Generation security
Ten Tips for Implementing Next Generation Security is an extract from “100 Tips for Implementing Network Security”, the new must-read paperback from the Stonesoft press.
View ArticleNew independent evasion research from the SANS Institute
The new "Beating the IPS" report from the SANS Institute demonstrates, with clear methodology, how IPS products from HP Tipping Point, Fortinet, Checkpoint Blade, and Palo Alto are vulnerable to cyber...
View ArticleWe must end the cyber warfare 'Wild West' or risk catastrophe
The publication of NATO's Manual on the International Law Applicable to Cyber Warfare reminds us that the international community has yet to establish rules and norms in the cyber domain.
View ArticleSilky Paws Need Claws – The Problems of Defensive Cyber Strategies
Stonesoft's director of cyber security, Dr. Jarno Limnéll, and Dr. Jan Hanska explore the strategic challenges facing nations as they develop cyber strategies and their cyber capabilities.
View ArticleKorean crisis accelerates cyber arms race
As tensions mount on the Korean peninsula the cyber domain is in focus. Stonesoft's Jarno Limnéll analyzes this escalating conflict and the changing nature of diplomacy in the networked age.
View ArticleArticle 0
Does US Presidential Policy Directive 20 herald a sea change in international relations, and what are the ramifications of a pre-emptive cyber policy? Read more below and continue the conversation on...
View ArticleSecurity connected
McAfee has launched a voluntary recommended public tender offer for all shares and option rights in Stonesoft Corporation.
View ArticleResilience – how to survive a cyber attack
Developing and maintaining resilience is a central demand presented by contemporary security thinking. In the future, IT-dependent societies must be capable of withstanding an attack, or surviving an...
View Article
More Pages to Explore .....