[*] [+] [-] [x] [A+] [a-]  
[l] at 3/14/23 3:50pm
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.

[Author: lucian_constantin@idg.com] [Category: Akamai, Threat and Vulnerability Management, Malware, Botnets]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/10/23 5:16am
The company’s marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses.

[Author: avenkat@idg.com] [Category: Data Breach]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/10/23 2:30am
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.

[Category: Malware, Vulnerabilities]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/9/23 12:41pm
Aruba Networks plans to prioritize development of a short list of key networking technologies – including data-center switching, private 5G, and secure access service edge (SASE) – that it finds are top of mind for enterprise customers.Hewlett Packard Enterprise’s network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company’s Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.To read this article in full, please click here

[Category: Networking, HPE, 5G, SASE, SD-WAN, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/7/23 3:45pm
VMware has revamped its Workspace One mobile and virtual desktop platform by boosting performance, making it more service-oriented and easy to manage.Workspace One is VMware’s endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. The highly-integrated suite includes device management, single sign-on, remote access control, endpoint security, analytics, automation and virtualization.The changing way workers are using and accessing applications from multiple devices prompted the over-arching need to change Workspace One and how its services are delivered.To read this article in full, please click here

[Category: VMware, Systems Management, Cloud Management, Cloud Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/7/23 7:00am
UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ETFortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.The company has exanded its Secure Private Access offering that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.To read this article in full, please click here

[Category: SASE, Cloud Security, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/7/23 5:12am
Akamai Hunt combines the company’s historic DNS, WAF, and DDoS data with Guardicore’s segmentation and telemetry to detect and eliminate evasive threats.

[Category: Threat and Vulnerability Management, Cloud Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/7/23 3:00am
As the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.

[Category: Network Security, Identity Management Solutions, Access Control, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/6/23 8:29am
The name Royal Caribbean conjures up images of luxury cruise ships, top-notch entertainment, fine dining, sandy beaches, breathtaking sunsets, tall tropical beverages.“Our mission is to create fabulous vacations with great experiences and great memories for our crew and our guests,” says John Maya, vice president of operational excellence at Miami-based Royal Caribbean Group.Beyond the glitz and glamour, however, Royal Caribbean has the same internal systems as any company in the travel/hospitality industry – corporate offices, sales, marketing, reservations, call centers, baggage handling, etc.Maya describes his IT infrastructure as hybrid cloud, with some resources hosted on Amazon AWS and Microsoft Azure, but also some core systems, such as the mission critical reservations application, running on an IBM AS-400 server in an Equinix data center in Virginia.To read this article in full, please click here

[Category: Access Control, VPN]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/3/23 9:15am
HPE plans to expand its Aruba SASE platform with Axis Security’s Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.

[Category: Cloud Security, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/2/23 3:20pm
IBM and data security and backup provider Cohesity have formed a new partnership, calling for Cohesity’s data protection functionality to be incorporated into an upcoming IBM storage product suite, dubbed Storage Defender, for better protection of end-user organizations’ critical information.The capabilities of Cohesity's DataProtect backup and recovery product will be one of four main feature sets in the Storage Defender program, according to an announcement from IBM Thursday.The Storage Defender suite is designed to bring together IBM and third-party products in order to unify primary, secondary replication, and backup management, said IBM. It’s an as-a-service offering that features a single-pane-of-glass interface, SLA-driven policy automation and the ability to work with a wide variety of data sources, including physical storage, cloud hypervisors, and an assortment of different database types.To read this article in full, please click here

[Category: Enterprise Storage, Security, Backup and Recovery]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/2/23 3:50am
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.

[Author: avenkat@idg.com] [Category: Vulnerabilities, Data Breach, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 3/1/23 10:53am
IBM said this week it will soon roll out an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.Expected in the third quarter, z/OS 3.1 will  support technologies intended to enable deployment of AI workloads co-located with z/OS applications, IBM said in a customer preview letter.The new OS will work best with the newest version of the Big Iron, the z16, but it will support z14 models and above, IBM says.The z16 includes an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.To read this article in full, please click here

[Category: Cloud Computing, Cloud Management, Cloud Security, Cloud Storage, Hybrid Cloud]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/27/23 3:30am
One year after Russia’s invasion of Ukraine, the country’s overall resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.Initially the country’s internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.For example, researchers at Top10VPN recently reported some distressing analysis including:To read this article in full, please click here

[Category: Internet, Telecommunications, Telecommunications Industry, Mobile, Network Security, Small and Medium Business]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/24/23 3:35am
The CDN provider's new DDoS scrubbing offering impersonates the customer’s network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks.

[Category: DDoS]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/22/23 5:43pm
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.

[Author: avenkat@idg.com] [Category: Data Breach, Data Center]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/17/23 11:04am
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network’s Unit 42 team reports.

[Author: avenkat@idg.com] [Category: Botnets, DDoS, IoT Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/13/23 1:22pm
Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.“Today’s operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what’s going on across the enterprise,” according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.To read this article in full, please click here

[Category: Network Security, Network Monitoring]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/13/23 10:49am
Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace.Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales. The business wanted IT systems to support customers ordering online and picking up at a physical store within two hours.The network needed to securely support real-time, bandwidth-intensive IP security cameras. And Williams-Lucas wanted to roll out beaconing technology, in which the network gathers information about customer in-store activity via Bluetooth or Wi-Fi, and can send discount offers to a customer’s phone based on where they are in the store and what they appear to be interested in.To read this article in full, please click here

[Category: Networking, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/9/23 10:00am
After the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.The attacks, aimed at VMware’s ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.To read this article in full, please click here

[Category: Ransomware, Server, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 2/8/23 11:08am
Extreme Networks has added network fabric capabilities to its flagship SD-WAN platform to enable customers to link and manage distributed resources more securely.Additional enhancements to the ExtremeCloud SD-WAN platform include improved automated workflows and direct connectivity to cloud systems such as Microsoft Azure and AWS.“The overarching idea is to help customers more effectively connect distributed sites, especially the smaller branch office, without increasing optical or management overhead,” said Rob Hull, product marketing director at Extreme. “For the smaller sites, especially, with maybe no IT person or few, it gives them the big-site quality-of-service feel and big-site centralized management capability.”To read this article in full, please click here

[Category: SD-WAN, Networking, Network Security]

As of 3/29/23 4:37pm. Last new 3/21/23 6:16am.

Next feed in category: Network World