October 08, 2020 Pierluigi Stella

If You Can Connect It, Protect It

Let's talk about the future of connected devices.  About how if you can connect it, then you need to protect …

read more
September 10, 2020 Sheela Goh

Should You Outsource Your Cybersecurity Needs To An MSSP?

That's the million dollar question, isn't it?  Should you outsource your cybersecurity needs to an MSSP? We’re often tempted to handle …

read more
August 06, 2020 Network Box USA

SIEM: The One Log Monitoring & Management Tool You Need In Your Cybersecurity Arsenal

A quick question for the cybersecurity decision-makers.  How do you want your cybersecurity software to be defined?  Agile?  Durable?  Intelligent?  …

read more
August 25, 2020 D. Nour Dandan

The Benefits of a Cloud-Based Email Security Solution

The average email user receives 121 emails every day. Therefore, if you are a company of 100 employees, your email …

read more
April 03, 2020 D. Nour Dandan

Tips For Small & Medium Businesses To Survive COVID-19

It’s safe to say that we’ve all felt the impact of COVID-19. SMBs are especially feeling the strain of an …

read more

CYBER SECURITY

Get updates from Network Box USA

Enter your email address to receive news and insights from us.


All latest news

December 01, 2016 Network Box USA

Network Box USA named in CIO Review’s 20 Most Promising DDoS Solution Providers for 2016

CIO Review – DDoS Special The corporate world is constantly getting smarter by leveraging the latest internet technology advancements. Information sharing has over …

November 18, 2016 Pierluigi Stella

Spear Phishing, Conclusion

In this concluding post on the topic of Spear Phishing (read the first one here), allow me to share something …

November 17, 2016 Pierluigi Stella

Spear Phishing, Part 1

One of the dangerous issues we currently face with spam emails is that of spear phishing – a type of …

September 28, 2016 D. Nour Dandan

The Ransomware Epidemic: Why It’s Spreading and What You Can Do

If it hasn’t already been dubbed “The Year of Ransomware,” 2016 is well on its way to earning that title. …

August 10, 2016 Pierluigi Stella

Why You Need a WAF – Conclusion

Over the past two editions, we outlined how vital it is to provide a robust security posture for one’s web …

August 05, 2016 Pierluigi Stella

Why You Need A WAF – Part 2

Previously, we touched on the critical value of protecting one’s web server, and the various way to do just that such …

August 03, 2016 Pierluigi Stella

Why You Need A WAF – Part 1

At the time of writing of this blog, attacks against web servers are (by far) the most prevalent issue in …

July 13, 2016 D. Nour Dandan

Fear, Urgency, and Doubt: The FUD of Social Engineering

Having worked in the cybersecurity sector for 5 years, I’ve become quite the skeptic when it comes to unsolicited phone …

June 29, 2016 D. Nour Dandan

Cost of Cybersecurity – Part 3

In our previous blog entries, we examined the costs of personnel and technology when it comes to cybersecurity. In today’s entry, we’ll go …

June 22, 2016 D. Nour Dandan

Cost of Cybersecurity – Part 2

We covered the cost of hiring cybersecurity experts in our previous blog entry.  Today, we take a dive into the …