Top

Tag: security


Wireless

Get ready for the convergence of IT and OT networking and security

August 16, 2019

Via: Networkworld Software

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention. […]


Monitoring&Analysis, Security

Are you being tracked through a Bluetooth security vulnerability?

August 16, 2019

Via: CSO

Research published this month by a team from Boston University has revealed a number of flaws in the way that Bluetooth Low Energy functionality is implemented on a wide range of consumer devices. These devices – including both Apple and […]


Monitoring&Analysis, Security

12 things every computer security pro should know

August 14, 2019

Via: CSO

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]


Monitoring&Analysis, Security

Cybersecurity for Federal Networks: It All Starts with Visibility

August 13, 2019

Via: Cisco Blog

A configuration mistake or purposeful mis-configuration is no joke. But it does illustrate how a misconfigured network can quickly become a security event (or it may already be one and your team does not know it). But how do you […]


Monitoring&Analysis, Security

ICS security: Popular building management system vulnerable to takeover

August 13, 2019

Via: CSO

Security researchers found a remotely exploitable critical vulnerability in a building management system used by businesses, hospitals, factories and other organizations to control things like ventilation, temperature, humidity, air pressure, lighting, secure doors and more. The vendor has released a […]


Monitoring&Analysis, Security

Review: How Perimeter 81 provides a near plug-and-play network security service

August 13, 2019

Via: CSO

The ways that most people and organizations use computers has radically changed over the past couple decades. Most work is no longer done inside traditional offices. Desktop computers are less popular than laptops, tablets, smartphones and other portable devices. And […]


Analysis, Monitoring&Analysis, Software

How SD-Branch addresses today’s network security concerns

August 12, 2019

Via: Networkworld Security

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security. But […]


Monitoring&Analysis, Security

Smishing and vishing: How these cyber attacks work and how to prevent them

August 9, 2019

Via: CSO

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. […]


Hardware, Monitoring&Analysis, Security

New Spectre-like CPU vulnerability bypasses existing defenses

August 7, 2019

Via: CSO

Security researchers have found a new way to abuse the speculative execution mechanism of modern CPUs to break security boundaries and leak the contents of kernel memory. The new technique abuses a system instruction called SWAPGS and can bypass mitigations […]


Monitoring&Analysis, Security

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

August 5, 2019

Via: CSO

Judging by last week’s Capital One breach and Equifax settlement, cybersecurity remains a topical, if not ugly, subject. The timing couldn’t be better for these unfortunate events. Why? Because the cybersecurity community gets together this week in Las Vegas for […]