|
Mar 14, 2023
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.
|
|
Mar 10, 2023
The company's marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses.
|
|
Mar 10, 2023
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.
|
|
Mar 09, 2023
Aruba Networks plans to prioritize development of a short list of key networking technologies - including data-center switching, private 5G, and secure access service edge (SASE) - that it finds are top of mind for enterprise customers.
Hewlett Packard Enterprise's network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company's Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.
To read this article in full, please click here
|
|
Mar 07, 2023
VMware has revamped its Workspace One mobile and virtual desktop platform by boosting performance, making it more service-oriented and easy to manage.
Workspace One is VMware's endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. The highly-integrated suite includes device management, single sign-on, remote access control, endpoint security, analytics, automation and virtualization.
The company workers usin and accessing applications from multiple devices prompted the over-arching need to change Workspace One and how its services are delivered.
To read this article in full, please click here
|
|
Mar 07, 2023
UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ET
Fortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.
The company has added a feature to its Secure Private Access that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.
To read this article in full, please click here
|
|
Mar 07, 2023
Akamai Hunt combines the company's historic DNS, WAF, and DDoS data with Guardicore's segmentation and telemetry to detect and eliminate evasive threats.
|
|
Mar 07, 2023
As the security model becomes the preferred security strategy, it's worth looking at what it is and what it takes to achieve.
|
|
Mar 06, 2023
The name Royal Caribbean conjures up images of luxury cruise ships, top-notch entertainment, fine dining, sandy beaches, breathtaking sunsets, tall tropical beverages.
"Our mission is to create fabulous vacations with great experiences and great memories for our crew and our guests," says John Maya, vice president of operational excellence at Miami-based Royal Caribbean Group.
Beyond the glitz and glamour, however, Royal Caribbean has the same internal systems as any company in the travel/hospitality industry - corporate offices, sales, marketing, reservations, call centers, baggage handling, etc.
Maya describes his IT infrastructure as hybrid cloud, with some resources hosted on Amazon AWS and Microsoft Azure, but also some core systems, such as the mission critical reservations application, running on an IBM AS-400 server in an Equinix data center in Virginia.
To read this article in full, please click here
|
|
Mar 03, 2023
HPE plans to expand its Aruba SASE platform with Axis Security's Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.
|
|
Mar 02, 2023
IBM and data security and backup provider Cohesity have formed a new partnership, calling for Cohesity's data protection functionality to be incorporated into an upcoming IBM storage product suite, dubbed Storage Defender, for better protection of end-user organizations' critical information.
The capabilities of Cohesity's DataProtect backup and recovery product will be one of four main feature sets in the Storage Defender program, according to an announcement from IBM Thursday.
The Storage Defender suite is designed to bring together IBM and third-party products in order to unify primary, secondary replication, and backup management, said IBM. It's an as-a-service offering that features a single-pane-of-glass interface, SLA-driven policy automation and the ability to work with a wide variety of data sources, including physical storage, cloud hypervisors, and an assortment of different database types.
To read this article in full, please click here
|
|
Mar 02, 2023
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.
|
|
Mar 01, 2023
IBM said this week it will soon roll out an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.
Expected in the third quarter, z/OS 3.1 will support technologies intended to enable deployment of AI workloads co-located with z/OS applications, IBM said in a customer preview letter.
The new OS will work best with the newest version of the Big Iron, the z16, but it will support z14 models and above, IBM says.
The z16 includes an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.
To read this article in full, please click here
|
|
Feb 27, 2023
One year after Russia's invasion of Ukraine, the country's overall resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.
Initially the country's internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.
For example, researchers at Top10VPN recently reported some distressing analysis including:
To read this article in full, please click here
|
|
Feb 24, 2023
The CDN provider's new DDoS scrubbing offering impersonates the customer's network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks.
|
|
Feb 22, 2023
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.
|
|
Feb 17, 2023
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network's Unit 42 team reports.
|
|
Feb 13, 2023
Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.
The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.
"Today's operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what's going on across the enterprise," according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.
To read this article in full, please click here
|
|
Feb 13, 2023
Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace.
Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales. The business wanted IT systems to support customers ordering online and picking up at a physical store within two hours.
The network needed to securely support real-time, bandwidth-intensive IP security cameras. And Williams-Lucas wanted to roll out beaconing technology, in which the network gathers information about customer in-store activity via Bluetooth or Wi-Fi, and can send discount offers to a customer's phone based on where they are in the store and what they appear to be interested in.
To read this article in full, please click here
|
|
Feb 09, 2023
After the FBI and CISA on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.
The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.
To read this article in full, please click here
|
|
Feb 08, 2023
Extreme Networks has added network fabric capabilities to its flagship SD-WAN platform to enable customers to link and manage distributed resources more securely.
Additional enhancements to the ExtremeCloud SD-WAN platform include improved automated workflows and direct connectivity to cloud systems such as Microsoft Azure and AWS.
"The overarching idea is to help customers more effectively connect distributed sites, especially the smaller branch office, without increasing optical or management overhead," said Rob Hull, product marketing director at Extreme. "For the smaller sites, especially, with maybe no IT person or few, it gives them the big-site quality-of-service feel and big-site centralized management capability."
To read this article in full, please click here
|
|
Feb 07, 2023
Cisco has strengthened some of its key security software packages with an eye toward better protecting distributed enterprise resources.
Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications. The company also enhanced its SASE offering by expanding its SD-WAN integration options.
To read this article in full, please click here
|
|
Feb 07, 2023
The semiconductor equipment maker reported the ransomware incident just a day after national cybersecurity agencies and security experts around the world warned about a global ransomware attack that hit thousands of servers running on VMware ESxi.
|
|
Feb 06, 2023
Cybersecurity agencies globally, including in Italy, France, the US and Singapore have issued alerts about a ransomware attack targeting the VMware ESXi hypervisor.Aourva
|
|
Feb 06, 2023
Fortinet is introducing a new ASIC that promises to meld the security and network functions of its core family of FortiGate firewalls more efficiently and powerfully.
The custom chip is 7-nanometer package, called fifth-generation security processing system or FortiSP5, that promises a number of performance improvements for the FortiGate system. It enables 17x faster firewall performance and 32x faster encryption processes while using 88% less power compared to standard CPUs, according to John Maddison, executive vice president of products and CMO at Fortinet. With FortiSP5, Fortinet's firewalls will be able to handle higher levels of traffic inspection to block threats and boost protection, according to the vendor.
To read this article in full, please click here
|
|
Feb 06, 2023
A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.
|
|
Feb 02, 2023
A new offering from IT services provider NTT combines Palo Alto Networks' Prisma SASE offering with NTT's managed network services and AIOps infrastructure.
SASE - secure access service edge - has been gaining interest for its potential to reduce networking complexity while improving security. It combines SD-WAN with security services, including secure web access gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and firewall-as-a-service (FWaaS), in a single, cloud-delivered service model.
To read this article in full, please click here
|
|
Feb 02, 2023
Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. "Advanced security inspection services can be applied, firewalls can provide separation, and a demilitarized zone can be implemented," said Michael Fagan, chief transformation officer at Village Roadshow, the largest theme park owner in Australia.
But it required backhauling traffic from remote sites to a data center or hub for security inspection, which can hurt application performance, create a poor user experience, and cost the company in productivity, he said.
When the pandemic led the company to transition to a hybrid workforce, with most people working from home or from a remote site, it prompted Village Roadshow to rethink its network and security approach.
To read this article in full, please click here
|
|
Feb 01, 2023
About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.
|
|
Jan 23, 2023
A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.
|
|
Jan 20, 2023
AmerCareRoyal, which provides disposable products for the food service and hospitality industries, is the product of six mergers and acquisitions over the past several years, and its former network security setup couldn't keep up.
Jeff DeSandre, who joined the company as CIO in 2019, wanted an SD-WAN platform that came with more advanced management options and firewalls. After looking at the market, he added threat detection and response capabilities to his wish list. "I was focused on getting our arms quickly around our wide area network and securing our edge, and then making sure that the solution I went with could scale to my long-term roadmap," he says.
To read this article in full, please click here
|
|
Jan 19, 2023
By 2024, 88% of enterprises will use two or more infrastructure as a service (IaaS) providers, according to research by EMA, which believes that network infrastructure and operations teams must take a leadership role in defining network architecture that ensures the performance and security of their multi-cloud digital services.
EMA recently polled a group of these enterprises, surveying 351 IT stakeholders, including 39% in network engineering, 21% in the CIO suite, 15% on cloud teams, and 11% in cybersecurity.
EMA found that networking teams and network technology have become more important in 81% of multi-cloud strategies in recent years. Unfortunately, only 24% of research participants firmly believe that their networking teams have enough influence over cloud decision-making.
To read this article in full, please click here
|
|
Jan 18, 2023
Quantum-based security with what's advertised as "frictionless" deployment is now available from QuSecure.
|
|
Jan 17, 2023
New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it's network management platform.
|
|
Jan 13, 2023
Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally-managed cloud service that promises simplified WAN deployment, improved security, and better performance.
According to Gartner, SASE's benefits are transformational because it can speed deployment time for new users, locations, applications, and devices, as well as reduce attack surfaces and shorten remediation times by as much as 95%.
With the pandemic, adoption of SASE has been on an upward swing. Gartner predicts in its most recent SASE roadmap that 80% of enterprises will have adopted a SASE or SSE architecture by 2025, up from 20% in 2021. (Security service edge, or SSE, is a security-focused subset of SASE that's basically SASE without SD-WAN.)
To read this article in full, please click here
|
|
Jan 12, 2023
Despite the challenges posed by economic turmoil, epidemics, and political upheaval, network researchers are continuing to blaze new trails in innovation, performance, management, and security. In sum, 2023 is shaping up as a year of network evolution and transformation.
Here are eight network technologies you will want to pay particularly close attention to.
1. Unified SASE: Addresses hybrid workforce, hybrid clouds
Unified Secure Access Service Edge (SASE) tightly integrates security and networking into a single platform. The technology uses a single-pass scanning architecture combined with a unified policy that's configured via a unified console that draws from a unified data lake. "This is significant for organizations to continue to provide a consistent and assured user experience while protecting users, devices, sites, and data amid the rapidly evolving dynamics coming in 2023," says Kelly Ahuja, CEO of networking and cybersecurity firm Versa Networks.
To read this article in full, please click here
|
|
Jan 10, 2023
Intel's TDX framework gains a new capability, and a "shadow stack" in Xeon's fourth generation aims to knock out a dangerous cyberattack method.
|
|
Jan 09, 2023
The pandemic has changed how we work, probably forever. Most employees with jobs that can be done effectively from home have no intention of returning full time to the office. They find that their work-life balance is much more balanced without the long commutes and constant interruptions that accompany office work.
According to a McKinsey/Ipsos survey, 58 percent of American workers had the opportunity to work from home at least one day a week in 2022, while 38 percent were not generally required to be in the office at all.
To read this article in full, please click here
|
|
Jan 06, 2023
Industry veteran Tom Gillis, who left VMware in December, has returned to Cisco in a new but familiar role: senior vice president and general manager of Cisco's Security Business Group.
From 2007 to 2011, Gillis was vice president and general manager of Cisco's then-called Security Technology Group, which focused on developing network, content and identity management products.
After that, Gillis founded cloud computing firm Bracket Computing, which was acquired by VMware in May 2018.
Gillis ran VMware's $2 billion networking and security business from that point until this past December, and he was responsible for a number of its core products, including VMware's NSX networking and network/edge software products.
To read this article in full, please click here
|
|
Dec 26, 2022
What's the single most important thing that enterprises should know about networking in 2023? Forget all that speeds-and-feeds crap you hear from vendors. The answer is that networking is now, and forever, linked to business applications, and those applications are linked now to the way that we use the Internet and the cloud. We're changing how we distribute and deliver business value via networking, and so network technology will inevitably change too, and this is a good time to look at what to expect.
Growth in Internet dependence
First, the Internet is going to get a lot better because it's going to get a lot more important. It's not just that the top-end capacities offered will be raised, in many cases above 2 Gbps. Every day, literally, people do more online, and get more interactive, dynamic, interesting, websites to visit and content to consume. Internet availability has been quietly increasing, and in 2023 there will be a significant forward leap there, in large part because people who rely on something get really upset when it's not working.
To read this article in full, please click here
|
|
Dec 26, 2022
The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.
|
|
Dec 22, 2022
Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default - not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.
The traditional approach to security was based on the concept of "trust, but verify." The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.
Zero Trust principles change this to "never trust, always verify." A Zero Trust architecture doesn't aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.
To read this article in full, please click here
|
|
Dec 16, 2022
Hybrid and multicloud initiatives will continue to shape enterprise IT in 2023, and the impact on data-center networking will be felt across key areas including security, management, and operations. Network teams are investing in technologies such as SD-WAN and SASE, expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments.
"The most important core trend in data centers is the recognition that the hybrid cloud model - which combines current transaction processing and database activities with a cloud-hosted front-end element for the user interface - is the model that will dominate over time," said Tom Nolle, president of CIMI Corp. and a Network World columnist. The industry is seeing a slow modernization of data center applications to support the hybrid-cloud model, Nolle says, "and included in that is greater componentization of those applications, a larger amount of horizontal traffic, and a greater need to manage security within the hosted parts of the application."
To read this article in full, please click here
|
|
Dec 15, 2022
AIP goes one step further from API security and provides telemetry collection and intrusion detection for cloud-native workloads.
|
|
Dec 13, 2022
Backup and recovery systems are at risk for two types of ransomware attacks: encryption and exfiltration - and most on-premises backup servers are wide open to both. This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention.
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. And it seems no one wants to do something about it lest they become the new backup expert responsible for the server. This is an age-old problem that can allow backup systems to pass under the radar of sound processes that protect most servers.
To read this article in full, please click here
|
|
Dec 12, 2022
The need to surf the internet freely without restrictions or being noticed created the necessity for proxies. So, what is a proxy? To put it in simple terms, a proxy is a device that provides a gateway between users and the web. Therefore, it helps prevent cyber attackers from gaining access to a private network.
A proxy is a computer, referred to as an intermediary because it channels traffic between end-users and the web content they visit online. In data gathering, proxies enable you to access data from websites without being detected, increasing the success rate of extracting valuable information.
Top 10 Best Residential Proxy Service Providers
Several residential proxy providers claim to provide the ultimate security for your web activities and enable you to browse anonymously. However, some providers' services don't come close to what they claim to provide. Having stated that, the following providers will give you value for your money. If you need a reliable residential proxy, they will come to the rescue.
To read this article in full, please click here
|
|
Dec 12, 2022
Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.
First outlined by Gartner in 2019, SASE (pronounced "sassy") has quickly evolved from a niche, security-first SD-WAN alternative into a popular WAN sector that analysts project will grow to become a $10-billion-plus market within the next couple of years.
To read this article in full, please click here
|
|
Dec 06, 2022
Cloud services and hosting provider Rackspace Technology acknowledged Tuesday that a recent incident that took most of its Hosted Exchange email server business offline was the product of a ransomware attack. The company shut the service down last Friday.
It was not, initially, clear what had caused the outage, but Rackspace quickly moved to shift Exchange customers over to Microsoft 365, as this part of the company's infrastructure was apparently unaffected.
Rackpsace offers migration to Microsoft 365
Rackspace said today that there is "no timeline" for a restoration of Exchange service, but it is offering Exchange users technical assistance and free access to Microsoft 365 as a substitute, though it acknowledged that migration is unlikely to be a simple process for every user. Rackspace said that, while the migration is in progress, customers can forward email sent to their Hosted Exchange inboxes to an external server, as a temporary workaround.
To read this article in full, please click here
|
|
Dec 06, 2022
The job of a network engineer just keeps getting more complicated. Mission critical applications are competing for bandwidth. The sheer number of devices is exploding, driven by IoT. And the network itself if being extended to the cloud, the edge and to the home office.
And then there's cybersecurity to worry about. Attacks are on the rise across the board, and attackers are constantly looking for vulnerabilities or backdoors, upping the need for solid and secure networking to act as an early warning system for cybersecurity defenses.
Thankfully, there are many great tools available to help network engineers complete their never-ending tasks. And many of them are available for free. Here's our list of 12 killer network tools that won't break the bank.
To read this article in full, please click here
|
|
Dec 01, 2022
A demonstrated attack by cybersecurity researchers in IBM's cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.
|
|
Nov 29, 2022
Having thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least have another security mechanism in place that might catch it if the basic antivirus doesn't. DNS-based filtering can do this! It can help stop users from browsing to malware and phishing sites, block intrusive advertising to them, and serve as adult content filters.
First, a quick primer for those who are unfamiliar with DNS: You utilize the Domain Name System (DNS) every time you surf the Web. Each time you type a site name into the browser, DNS is queried for the IP address corresponding to that particular domain, so the browser can contact the Web server to get the content. The process of converting the domain name to its IP address is called domain-name resolution.
To read this article in full, please click here
|
|
Nov 22, 2022
DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies.
|
|
Nov 21, 2022
On the surface, Active Directory groups are a simple and straightforward way to manage identities (users and/or computers) and assign permissions. Users or computers are added as group members, and the group is referenced in access control lists (ACL) on file shares, mailboxes, applications, or other corporate resources. But experienced admins know that this simplicity quickly goes out the window as environments scale. As group memberships grow, management of memberships becomes increasingly complex.
Over the years, Microsoft and others have developed best practices for managing groups and permissions in an Active Directory environment. These strategies are something of a lost art, but there's value to be gained by leveraging these layers of sophistication.
To read this article in full, please click here
|
|
Nov 21, 2022
On the surface, Active Directory groups are a simple and straightforward way to manage identities (users and/or computers) and assign permissions. Users or computers are added as group members, and the group is referenced in access control lists (ACL) on file shares, mailboxes, applications, or other corporate resources. But experienced admins know that this simplicity quickly goes out the window as environments scale. As group memberships grow, management of memberships becomes increasingly complex.
Over the years, Microsoft and others have developed best practices for managing groups and permissions in an Active Directory environment. These strategies are something of a lost art, but there's value to be gained by leveraging these layers of sophistication.
To read this article in full, please click here
|
|
Nov 18, 2022
Dell Technologies has announced new products and services for data protection as part of its security portfolio.
Active data protection is often treated as something of an afterthought, especially compared to disaster recovery. Yet it's certainly a problem for companies. According to Dell's recent Global Data Protection Index (GDPI) research, organizations are experiencing higher levels of disasters than in previous years, many of them man-made. In the past year, cyberattacks accounted for 48% of all disasters, up from 37% in 2021, and are the leading cause of data disruption.
One of the major stumbling blocks in deploying data-protection capabilities is the complexity of the rollout. Specialized expertise is often required, and products from multiple vendors are often involved. Even the hyperscalers are challenged to provide multicloud data-protection services.
To read this article in full, please click here
|
|
Nov 16, 2022
Palo Alto Networks has released next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks.
The new features are built into the latest version of Palo Alto's firewall operating system - PAN 11.0 Nova - and include upgraded malware sandboxing for the company's WildFire malware-analysis service, advanced threat prevention (ATP), and a new cloud access security broker (CASB).
WildFire is Palo Alto's on-prem or cloud-based malware sandbox that is closely integrated with Palo Alto's firewalls. When a firewall detects anomalies, it sends data to WildFire for analysis. WildFire uses machine learning, static analysis, and other analytics to discover threats, malware and zero-day threats, according to the vendor.
To read this article in full, please click here
|
|
Nov 10, 2022
Recently during a research interview with a small but fast-growing business, for the first time I encountered an organization with a "no-network-vendor" network. That is, instead of using Cisco or Dell or even a white-box solution for switching and routing, the company deployed only Fortinet equipment for its entire network. That is, every network component is part of the security infrastructure for them.
They built the network this way not just to bake security into its core (a great idea in itself) but also for:
ease of management: they have one tool, it manages every component
ease of deployment: they have only two or three versions of each appliance, all the same except for capacity and port count
ease of expansion to new locations: every site is the same as any other site of similar size
They have a small stock of replacement appliances on the shelf, with which they provide rapid recovery for all locations. They could easily also consume security-operations center as-a-service, and use professional services for nearly all the rest of their network operations. In essence, their security solution could become their complete network solution as well.
To read this article in full, please click here
|
|
Nov 09, 2022
Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.
|
|
Nov 08, 2022
VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference.
VMware said then that Northstar will provide a central console for turning up networking and security services across private clouds and VMware Cloud deployments that run on public clouds. It will include VMware services such as Network Detection and Response, NSX Intelligence, advanced load balancing and Web Application Firewall. Within Northstar, Network Detection and Response support will provide scalable threat detection and response for workloads deployed in private and/or public clouds.
To read this article in full, please click here
|
|
Nov 04, 2022
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.
|
|
Nov 01, 2022
Security is the name of the game at Cisco's Partner Summit gathering this week with the rollout of a new firewall and added data-loss prevention (DLP) and passwordless authentication features to its security wares.
On the firewall front, Cisco announced the Secure Firewall 3105 it says is built specifically for hybrid workers and small branch offices.
Available early next year, the 1U 3105 supports 10Gbps throughput, 7Gbps IPSec throughput and 3,000 VPN peers. The box is the new low-end for the Secure Firewall 3100 family, including the 3110, 3120, 3130 and the high-end 3140, which supports 45Gbps throughput.
To read this article in full, please click here
|
|
Oct 31, 2022
A new specification from the Open Compute Project could mean more choices for IT pros when it comes time to replace server cards.
The spec defines a block of code that, when used in processors, establishes root of trust (RoT) boot security. Because the spec is open, any chip maker can use it, and it will provide interoperability with chips made by other chip makers that also use it. This can help eliminate being locked into a single vendor because of proprietary RoT code.
By standardizing on OCP hardware, for example, it's possible to replace a bad smartNIC from one vendor with one from another vendor, says Bill Chen, general manager of server product management at Supermicro, an OCP member.
To read this article in full, please click here
|
|
Oct 31, 2022
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
|
|
Oct 27, 2022
Its open-source Cloud Control Framework gives Cisco a common template to meet security standards and regulatory requirements across the globe.
|
|
Oct 26, 2022
Cisco is offering software updates for two of its AnyConnect for Windows products it says are actively being exploited in the field.
AnyConnect for Windows is security software package, in this case for Windows machines, that sets up VPN connectivity, provides access control and supports other endpoint security features. Cisco said AnyConnect products for MacOS, Linux are not affected.
Cisco said its Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability, which is described in this advisory.
To read this article in full, please click here
|
|
Oct 21, 2022
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.
Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.
"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."
To read this article in full, please click here
|
|
Oct 21, 2022
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.
Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.
"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."
To read this article in full, please click here
|
|
Oct 21, 2022
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.
Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.
"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."
To read this article in full, please click here
|
|
Oct 20, 2022
SolarWinds, the maker of a well-known and widely used suite of IT management software products, announced this week that it's expanding to the cloud, with the release of Observability, a cloud-native, SaaS-based IT management service that is also available for hybrid cloud environments.
The basic idea of Observability is to provide a more holistic, integrated overview of an end-user company's IT systems, using a single-pane-of-glass interface to track data from network, infrastructure, application and database sources. The system's machine learning techniques are designed to bolster security via anomaly detection.
To read this article in full, please click here
|
|
Oct 20, 2022
SolarWinds, is has launched a cloud-native, SaaS-based, IT-management service that is also available for hybrid-cloud environments.
Called Observability, the service provides a holistic, integrated overview of enterprise IT systems, using a single interface to track data from network, infrastructure, application, and database sources, says the company, which is noted for its suite of IT management software. The new service's machine-learning techniques are designed to bolster security via anomaly detection.
To read this article in full, please click here
|
|
Oct 18, 2022
As Cisco celebrates the 25th anniversary of Cisco Networking Academy, the company on Tuesday announced two new certifications and a plan to provide networking, cybersecurity and general IT training to 25 million people over the next 10 years.
The training will be done through the company's networking academy, an IT skills-to-jobs program that provides IT courses, learning simulators, and hands-on learning opportunities, supporting instructors and learners in 190 countries. To date, Cisco says more than 17.5 million global learners have taken Cisco Networking Academy courses to gain IT skills, with 95% of students attributing their post-course job or education opportunity to Cisco Networking Academy.
To read this article in full, please click here
|
|
Oct 12, 2022
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.
|
|
Oct 11, 2022
Google Cloud is rolling out new network and security features, including a service that provides Layer-7 security.
The new offerings announced at Google Cloud Next also include firewall and web application-protection options aimed at advancing existing cloud connectivity and ensuring the security of cloud-based resources.
"We are fundamentally enhancing our network fabric—which includes 35 regions, 106 zones and 173 network edge locations across 200-plus countries—and making it simpler and easier for organizations to migrate their existing workloads and modernize applications all while securing and making them easier to manage," said Muninder Sambi, vice president and general manager of networking for Google Cloud.
To read this article in full, please click here
|
|
Oct 05, 2022
As Morgan Stanley Smith Barney has learned, an information technology asset disposal program can protect a company against the potential catastrophe of data leaks from gear you're getting rid of.
|
|
Sep 29, 2022
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix while downtime costs in the six figures per hour. If Ian didn't impact your operations, now is the time to prepare for a future disaster that might hit your network.
Vulnerable areas include cloud providers' managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.
To read this article in full, please click here
|
|
Sep 29, 2022
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix at a downtime cost in the six figures per hour. If Ian didn't get you, now is the time to prepare for a future disaster that might hit your network.
Vulnerable areas include cloud providers' managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.
To read this article in full, please click here
|
|
Sep 23, 2022
Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.
|
|
Sep 13, 2022
A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.
The goal of SDP is to protect networks behind a flexible, software-based perimeter. "Advantages include stronger security and greater flexibility and consistency," says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.
To read this article in full, please click here
|
|
Sep 13, 2022
Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.
The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco's Enterprise Cloud & SD-WAN group. "They want to connect these users as reliably and securely as these users would be in an office environment," he said.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
To read this article in full, please click here
|
|
Aug 31, 2022
Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.
New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
To read this article in full, please click here
|
|
Aug 18, 2022
Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.
For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
To read this article in full, please click here
|
|
Aug 11, 2022
Cisco says an employee's credentials were compromised after an attacker gained control of a personal Google account.
|
|
Aug 08, 2022
The internet of things (IoT) is a catch-all term for the growing number of electronics that aren't traditional computing devices, but are connected to the internet to send data, receive instructions or both.
There's an incredibly broad range of ‘things' that fall under the IoT umbrella: Internet-connected ‘smart' versions of traditional appliances such as refrigerators and light bulbs; gadgets that could only exist in an internet-enabled world such as Alexa-style digital assistants; and internet-enabled sensors that are transforming factories, healthcare, transportation, distribution centers and farms.
What is the internet of things?
The IoT brings internet connectivity, data processing and analytics to the world of physical objects. For consumers, this means interacting with the global information network without the intermediary of a keyboard and screen (Alexa, for example).
To read this article in full, please click here
|
|
Aug 04, 2022
Internet shutdowns by governments across the world impacted 1.89 billion citizens globally in the first half of 2022, a 22% increase when compared with the second half of 2021.
A recent report compiled by VPN service provider Surfshark found there were 66 state-mandated internet blackouts imposed across six countries and territories during the period: Burkina Faso, India, Jammu and Kashmir, Kazakhstan, Pakistan, and Sudan. Local shutdowns were observed in India, Jammu and Kashmir region, and Pakistan, while Burkina Faso, Kazakhstan, and Sudan chose to cut down internet connections nationwide.
While there was an overall decrease in the number of internet shutdowns during the period—72 cases in the first half of 2022 compared with 84 reported in the second half of 2021—the number of people impacted was much higher, as reliance on the internet has increased globally.
To read this article in full, please click here
|
|
Aug 02, 2022
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.
|
|
Jul 29, 2022
You've done everything to secure your network, and you still face threats. That's what most enterprises say about their network security, and they're half right. Yes, they still face threats, but they've not done everything to address them. In fact, most enterprises haven't really implemented the two foundations on which real network security must be based.
When I ask enterprises whether they've done a top-down analysis of network security, they usually say they do it every year. When I ask what's involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.
To read this article in full, please click here
|
|
Jul 27, 2022
While the need for it may be years away, IBM has added additional mainframe protection against future quantum-based security attacks.
When Big Blue rolled out the newest iteration of its mainframe - the z16—in April, one of its core design pillars was a promise to protect organizations from anticipated quantum-based security threats. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, IBM stated.
To read this article in full, please click here
|
|
Jul 15, 2022
It's time to take a hard look at whether you're devoting enough resources to securing your network infrastructure. Short answer: You're probably not.
If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.
This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.
To read this article in full, please click here
|
|
Jul 15, 2022
It's time to take a hard look at whether you're devoting enough resources to securing your network infrastructure. Short answer: You're probably not.
If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.
This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.
To read this article in full, please click here
|
|
Jul 14, 2022
Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls.
|
|
Jul 13, 2022
Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.
On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
To read this article in full, please click here
|
|
Jul 13, 2022
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.
|
|
Jul 12, 2022
Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.
Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don't exist and enterprise data and the people accessing it are increasingly distributed and decentralized.
To read this article in full, please click here
|
|
Jun 30, 2022
IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications.
Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox. The instances would run on Red Hat OpenShift on x86 hardware. The service also includes access to z/OS systems and integrates with modern source-code management platforms such as GitHub and GitLab.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
To read this article in full, please click here
|
|
Jun 23, 2022
New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.
|
|
Jun 16, 2022
Cisco is taking aim at better controlling the performance and development of core applications with a new AppDynamics cloud service and open-source development tools.
AppDynamics Cloud is a cloud-native service designed to let enterprises observe applications and take action to remediate performance problems.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
Available by the end of June, the service is built to observe distributed and dynamic cloud-native applications at scale, wrote chief marketing officer of Cisco AppDynamics, Eric Schou in a blog about the new offering.
To read this article in full, please click here
|
|
Jun 14, 2022
Cisco is taking a big step toward cloud-management of both its Catalyst campus and Nexus data-center equipment.
At the Cisco Live customer event this week, the company rolled out two cloud-based management services that provide more options for enterprises to support hybrid workforces.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
Catalyst management in the cloud
The first service, Cloud Management for Cisco Catalyst, lets customers manage and troubleshoot Catalyst 9000 switching and wireless campus and branch devices from the company's cloud-based Meraki dashboard, which can manage and troubleshoot a wide variety of devices and networks from a single screen. According to Cisco, Catalyst customers can run a CLI command with information about their organization, and it will move management of that device over to the Meraki cloud.
To read this article in full, please click here
|
|
Jun 08, 2022
Intel has introduced a reference design it says can enable accelerator cards for security workloads including secure access service edge (SASE), IPsec, and SSL/TLS.
The upside of the server cards would be offloading some application processing from CPUs, effectively increasing server performance without requiring additional server rack space, according to Intel.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]
The announcement was made at RSA Conference 2022, and details were published in a blog post by Bob Ghaffardi, Intel vice president and general manager of the Enterprise and Cloud Division.
To read this article in full, please click here
|
|
Jun 06, 2022
Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.
The biggest piece of the Cisco roll out was a new overarching security platform called the Cisco Security Cloud will include unified management and policies, and offer open APIs to help grow a multivendor security ecosystem.
Cisco defines the Security Cloud as a "multi-year strategic vision for the future of security." It is an ongoing journey that began several years ago and Cisco will continue delivering upon the key tenets of this vision with a consistent roadmap. The cloud will be made up of existing products like Umbrella and offerings from Duo, other features will be developed in the future.
To read this article in full, please click here
|
|
Jun 03, 2022
Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.
Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.
To read this article in full, please click here
|
|