In the past few months, there have been major changes in information security attack strategies from advanced persistent threats (APT) to disturbed denial of services (DDOS), botnets, insider threats and more – an exciting and tumultuous time for security professionals. The question on everyone’s mind now is how to tighten security and protect critical information and related assets?