Sicurezza

What are the options for securing SD-WAN?

Pubblicato il

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows. SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners. [ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled […]

Sicurezza

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Pubblicato il

With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016. Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and […]

Sicurezza

22 essential Linux security commands

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

22 essential security commands for Linux

Pubblicato il

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo  – instead […]

Sicurezza

Tips for securing IoT on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

Tips to improve IoT security on your network

Pubblicato il

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still in the early days of the IoT. The analyst firm Gartner, for example, […]

Sicurezza

How to eliminate the default route for greater security

Pubblicato il

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default […]

Sicurezza

Stopping ransomware starts with the security pros

Pubblicato il

Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols. After last week’s WannaCry event, these numbers may start to go down […]

Sicurezza

The CSO IoT security basics survival guide

Pubblicato il

The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business. IoT platforms are expected to save organizations money, improve decision-making, increase staff productivity, provide better visibility into the organization […]

Sicurezza

What it takes to be a security architect

Pubblicato il

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute. Anyone in this position can expect to […]