Sicurezza

Get ready for the convergence of IT and OT networking and security

Pubblicato il

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and […]

Sicurezza

How SD-Branch addresses today’s network security concerns

Pubblicato il

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security. But now the industry is shifting to software-defined branch (SD-Branch), which is broader than SD-WAN but […]

Sicurezza

The role of next-gen firewalls in an evolving security architecture

Pubblicato il

Understanding the current state of enterprise firewall technology requires first debunking two broadly held misconceptions: First, many believe the firewall has become less relevant in contemporary enterprise network security architectures, for a variety of reasons: the ubiquitous use of mobile devices and cloud computing have expanded the traditional network perimeter; trendy concepts like “zero trust” […]

Sicurezza

Reports: As the IoT grows, so do its threats to DNS

Pubblicato il

The internet of things is shaping up to be a more significant threat to the Domain Name System through larger IoT botnets, unintentional adverse effects of IoT-software updates and the continuing development of bot-herding software. The Internet Corporation for Assigned Names and Numbers (ICANN) and IBM’s X-Force security researchers have recently issued reports outlining the […]

Sicurezza

When it comes to the IoT, Wi-Fi has the best security

Pubblicato il

When it comes to connecting internet of things (IoT) devices, there is a wide variety of networks to choose from, each with its own set of capabilities, advantages and disadvantages, and ideal use cases. Good ol’ Wi-Fi is often seen as a default networking choice, available in many places, but of limited range and not […]

Sicurezza

Worst DNS attacks and how to mitigate them

Pubblicato il

The Domain Name System remains under constant attack, and there seems to be no end in sight as threats grow increasingly sophisticated. DNS, known as the internet’s phonebook, is part of the global internet infrastructure that translates between familiar names and the numbers computers need to access a website or send an email. While DNS […]

Sicurezza

Cisco to buy IoT security, management firm Sentryo

Pubblicato il

Looking to expand its IoT security and management offerings Cisco plans to acquire Sentryo, a company based in France that offers anomaly detection and real-time threat detection for Industrial Internet of Things (IIoT) networks. Founded in 2014 Sentryo products include ICS CyberVision – an asset inventory, network monitoring and threat intelligence platform – and CyberVision […]

Sicurezza

Does your cloud-access security broker support IPv6? It should.

Pubblicato il

Cloud access security brokers (CASB) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. That’s because CASBs might not support IPv6, which could be in wide corporate use even in enterprises that choose IPv4 as their preferred protocol. [ Related: What […]

Sicurezza

Meta Networks builds user security into its Network-as-a-Service

Pubblicato il

Network-as-a-Service (NaaS) is growing in popularity and availability for those organizations that don’t want to host their own LAN or WAN, or that want to complement or replace their traditional network with something far easier to manage. With NaaS, a service provider creates a multi-tenant wide area network comprised of geographically dispersed points of presence […]