Network Security in 2018: Establishing Leadership

Thank you for reading our blog series on Network Security! This is the final of the series, and today we focus on a network security opportunity, which is establishing security leadership. Enhancing cybersecurity is a critical move for every organization. Moreover,...

Network Security in 2018 – Control Via the Cloud

Happy New Year! As we enter 2018, there has never been a time more critical to focus on the latest challenges and opportunities for network security. In late 2017, we featured a blog series on network security, and continue with another post today on “Control...

Network Security Opportunity: Detection and Response

As part of our six-part blog series on network security, we earlier discussed the challenges around network security. Now, let’s talk opportunities, starting with detection and response. According to Gartner, detection and response is the top security priority...

Network Security Challenge: IT Budgets

As part of our six-part blog series on network security, here is the next challenge: IT Budgets. Budgeting for cybersecurity expenses is a concern as organizations and officials push to expand these budgets as well as capabilities of existing security teams. When it...

165 Halsey Street Data Center Releases New eBook

165 Halsey Street has announced the release of its latest free eBook, “Network Security: Challenges and Opportunities for 2017/18.” The topic of cybersecurity remains one of the hottest in the tech and telecom industries. A critical issue that spans the world, there...
Network Security Challenge:  Shortage of Skills

Network Security Challenge: Shortage of Skills

Download Our New eBook As part of our six-part blog series on network security, we now focus on the next challenge: Shortage of Skills. The cybersecurity industry is a rapidly growing, multi-billion-dollar-plus market, but it’s facing a serious talent shortage. Recent...
Network Security Challenge: Evolving Attack Vectors

Network Security Challenge: Evolving Attack Vectors

Download our new eBook As part of our six-part blog series on network security, let’s focus today on our first challenge: Evolving Attack Vectors Malicious people and organizations use a variety of methods to attack individuals and enterprises. With each attack...