Sicurezza

Cisco tags critical security holes in SD-WAN software

Pubblicato il

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio. Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device. The first critical problem–with a Common Vulnerability Scoring System […]

Sicurezza

Lessons that insurrection selfies hold for legitimate enterprises

Pubblicato il

The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later. Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters […]

Sicurezza

How to deploy 802.1x for Wi-Fi using WPA3-Enterprise

Pubblicato il

Wi-Fi Protected Access 3 (WPA3) has brought significant security improvements to Wi-Fi networks, particularly WPA-3Enterprise, which includes tweaks to make authenticating to the network more secure. One of these is has to do with 802.1x authentication that is used to determine whether Wi-Fi clients will be granted access to the enterprise network. Wi-Fi resources The […]

Sicurezza

Wi-Fi: How to deploy 802.1x authentication using WPA3-Enterprise

Pubblicato il

Wi-Fi Protected Access 3 (WPA3) has brought significant security improvements to Wi-Fi networks, particularly WPA-3Enterprise, which includes tweaks to make authenticating to the network more secure. One of these is has to do with 802.1x authentication that is used to determine whether Wi-Fi clients will be granted access to the enterprise network. Wi-Fi resources The […]

Sicurezza

SASE check list: 7 key evaluation criteria

Pubblicato il

The marriage of networking and security into the secure-access service edge stands to improve application performance, reduce infrastructure complexity, and protect sensitive data, and as such SASE is an attractive architecture for enterprises large and small. Due to the newness of SASE offerings, though, providers are still building and refining the features of their services, […]

Sicurezza

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

Pubblicato il

Hot patching and isolating potentially affected resources are on the IT response schedule as enterprises that employ SolarWinds Orion network-monitoring software look to limit the impact of the serious Trojan unleashed on the platform. The supply-chain attack, reported early this week by Reuters and detailed by security researchers at FireEye and Microsoft involves a potential […]

Sicurezza

Zero trust planning: Key factors for IT pros to consider

Pubblicato il

Moving away from VPNs as a means to protect corporate networks at the perimeter and moving toward zero-trust network access requires careful enterprise planning and may require implementing technologies that are new to individual organizations. ZTNA employs identity-based authentication to establish trust with entities trying to access the network and grants each authorized entity access […]

Sicurezza

Who’s selling SASE and what do you get?

Pubblicato il

Secure access service edge (SASE) architecture rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources, but it’s still in its infancy. Vendors and service providers sell offerings that they call SASE, but what they actually provide and how they provide it varies widely. […]