Top

Category: Monitoring&Analysis


Monitoring&Analysis, Security

Are you being tracked through a Bluetooth security vulnerability?

August 16, 2019

Via: CSO

Research published this month by a team from Boston University has revealed a number of flaws in the way that Bluetooth Low Energy functionality is implemented on a wide range of consumer devices. These devices – including both Apple and […]


Monitoring, Monitoring&Analysis, Software

Unifying network performance and application monitoring puts an end to ‘mean time to innocence’

August 15, 2019

Via: RCR Wireless News

Network architectures are becoming more complex and decentralized. Applications are becoming more advanced, data-heavy, and compute-intensive. Both trends will continue as communications service providers (CSPs) upgrade their 4G networks first, and then begin the migration to 5G. While doing so, […]


Monitoring&Analysis, Security

Beware rogue email rules and forms

August 15, 2019

Via: CSO

Most rich email clients (Outlook, Apple, Office 365, Gmail or Mozilla Thunderbird) allow users and developers to automate tasks based on incoming or outgoing emails. Actions allowed by some of the email clients are far more sophistication than others, although […]


Monitoring, Monitoring&Analysis, Software

Not a Fluke: NetScout’s enterprise network testing assets emerge as NetAlly

August 14, 2019

Via: RCR Wireless News

Today marks a fresh start for a test business that has been a part of several companies in recent years, and now gets a chance to stand on its own. NetScout has spun out the enterprise Wi-Fi and wired testing […]


Monitoring&Analysis, Security

12 things every computer security pro should know

August 14, 2019

Via: CSO

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]


Monitoring&Analysis, Security

Cybersecurity for Federal Networks: It All Starts with Visibility

August 13, 2019

Via: Cisco Blog

A configuration mistake or purposeful mis-configuration is no joke. But it does illustrate how a misconfigured network can quickly become a security event (or it may already be one and your team does not know it). But how do you […]


Monitoring&Analysis, Security

ICS security: Popular building management system vulnerable to takeover

August 13, 2019

Via: CSO

Security researchers found a remotely exploitable critical vulnerability in a building management system used by businesses, hospitals, factories and other organizations to control things like ventilation, temperature, humidity, air pressure, lighting, secure doors and more. The vendor has released a […]


Monitoring&Analysis, Security

Review: How Perimeter 81 provides a near plug-and-play network security service

August 13, 2019

Via: CSO

The ways that most people and organizations use computers has radically changed over the past couple decades. Most work is no longer done inside traditional offices. Desktop computers are less popular than laptops, tablets, smartphones and other portable devices. And […]


Analysis, Monitoring, Monitoring&Analysis

5 reasons to choose a managed SD-WAN and 5 reasons to think twice

August 12, 2019

Via: ITWorld Networking

Northgate Gonzalez Markets, a chain of grocery stores in southern California, was launching a fast-paced digital transformation initiative that required a complete revamp of its WAN infrastructure. Northgate was taking the bold step of eliminating its data center and moving […]


Analysis, Monitoring&Analysis, Software

How SD-Branch addresses today’s network security concerns

August 12, 2019

Via: Networkworld Security

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security. But […]