[*] [-] [-] [x] [A+] [a-]  
[l] at 9/29/22 6:11pm
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix while downtime costs in the six figures per hour. If Ian didn’t impact your operations, now is the time to prepare for a future disaster that might hit your network.Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.To read this article in full, please click here

[Category: Business Continuity, Hybrid Cloud]

[*] [-] [-] [x] [A+] [a-]  
[l] at 9/29/22 6:11pm
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix at a downtime cost in the six figures per hour. If Ian didn’t get you, now is the time to prepare for a future disaster that might hit your network.Vulnerable areas include cloud providers’ managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.To read this article in full, please click here

[Category: Business Continuity, Hybrid Cloud]

[*] [+] [-] [x] [A+] [a-]  
[l] at 9/23/22 12:37am
Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.

[Category: Cyberattacks, Data Breach]

[*] [+] [-] [x] [A+] [a-]  
[l] at 9/13/22 4:33pm
A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.The goal of SDP is to protect networks behind a flexible, software-based perimeter. "Advantages include stronger security and greater flexibility and consistency," says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.To read this article in full, please click here

[Category: Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 9/13/22 1:25pm
Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco’s Enterprise Cloud & SD-WAN group. “They want to connect these users as reliably and securely as these users would be in an office environment,” he said. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

[Category: Cisco Systems, SD-WAN, SDN, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/31/22 9:20am
Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

[Author: Michael Cooney] [Category: SD-WAN, WAN, Cloud Computing, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/18/22 4:00am
Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

[Author: Michael A. Flowers Sr.] [Category: Windows Server, Access Control, Infrastructure]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/11/22 4:53am
Cisco says an employee’s credentials were compromised after an attacker gained control of a personal Google account.

[Author: Michael Hill] [Category: Data Breach, Cyberattacks, Phishing]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/7/22 10:00pm
The internet of things (IoT) is a catch-all term for the growing number of electronics that aren't traditional computing devices, but are connected to the internet to send data, receive instructions or both.There's an incredibly broad range of ‘things’ that fall under the IoT umbrella: Internet-connected ‘smart’ versions of traditional appliances such as refrigerators and light bulbs; gadgets that could only exist in an internet-enabled world such as Alexa-style digital assistants; and internet-enabled sensors that are transforming factories, healthcare, transportation, distribution centers and farms.What is the internet of things? The IoT brings internet connectivity, data processing and analytics to the world of physical objects. For consumers, this means interacting with the global information network without the intermediary of a keyboard and screen (Alexa, for example).To read this article in full, please click here

[Author: Josh Fruhlinger] [Category: Internet of Things, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/4/22 4:08am
Internet shutdowns by governments across the world impacted 1.89 billion citizens globally in the first half of 2022, a 22% increase when compared with the second half of 2021.A recent report compiled by VPN service provider Surfshark found there were 66 state-mandated internet blackouts imposed across six countries and territories during the period: Burkina Faso, India, Jammu and Kashmir, Kazakhstan, Pakistan, and Sudan. Local shutdowns were observed in India, Jammu and Kashmir region, and Pakistan, while Burkina Faso, Kazakhstan, and Sudan chose to cut down internet connections nationwide.While there was an overall decrease in the number of internet shutdowns during the period—72 cases in the first half of 2022 compared with 84 reported in the second half of 2021—the number of people impacted was much higher, as reliance on the internet has increased globally.To read this article in full, please click here

[Author: Varun Aggarwal] [Category: Internet, Government IT, Privacy]

[*] [+] [-] [x] [A+] [a-]  
[l] at 8/2/22 10:58am
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

[Author: Shweta Sharma] [Category: Zero Trust, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/29/22 10:59am
You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right. Yes, they still face threats, but they’ve not done everything to address them. In fact, most enterprises haven’t really implemented the two foundations on which real network security must be based.When I ask enterprises whether they’ve done a top-down analysis of network security, they usually say they do it every year. When I ask what’s involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.To read this article in full, please click here

[Author: Tom Nolle] [Category: Networking, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/27/22 9:03am
While the need for it may be years away, IBM has added additional mainframe protection against future quantum-based security attacks.When Big Blue rolled out the newest iteration of its mainframe – the z16—in April, one of its core design pillars was a promise to protect organizations from anticipated quantum-based security threats. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, IBM stated.To read this article in full, please click here

[Author: Michael Cooney] [Category: Security, Data Center, Server]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/15/22 4:00am
It’s time to take a hard look at whether you’re devoting enough resources to securing your network infrastructure. Short answer: You’re probably not.If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.To read this article in full, please click here

[Author: John Burke] [Category: Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/14/22 4:50am
Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls.

[Author: Lucian Constantin] [Category: Vulnerabilities]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/13/22 10:11am
Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

[Author: Michael Cooney] [Category: Juniper Networks, Network Monitoring, Network Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/13/22 3:09am
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

[Author: Shweta Sharma] [Category: Zero Trust, IT Consulting Services]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/12/22 4:00am
Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don’t exist and enterprise data and the people accessing it are increasingly distributed and decentralized.To read this article in full, please click here

[Author: Jaikumar Vijayan] [Category: Access Control, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 6/30/22 6:43pm
IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications.Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox. The instances would run on Red Hat OpenShift on x86 hardware. The service also includes access to z/OS systems and integrates with modern source-code management platforms such as GitHub and GitLab. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

[Author: Michael Cooney] [Category: Cloud Computing, Cloud Security, Hybrid Cloud]

[*] [+] [-] [x] [A+] [a-]  
[l] at 6/23/22 12:08pm
New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

[Author: Shweta Sharma] [Category: Vulnerabilities, Email Security, IT Management, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 6/16/22 8:59am
Cisco is taking aim at better controlling the performance and development of core applications with a new AppDynamics cloud service and open-source development tools.AppDynamics Cloud is a cloud-native service designed to let enterprises observe applications and take action to remediate performance problems.   [ Get regularly scheduled insights by signing up for Network World newsletters. ] Available by the end of June, the service is built to observe distributed and dynamic cloud-native applications at scale, wrote chief marketing officer of Cisco AppDynamics, Eric Schou in a blog about the new offering.To read this article in full, please click here

[Author: Michael Cooney] [Category: Cisco Systems, Application Performance Management, Security]

As of 10/1/22 3:03pm. Last new 9/30/22 2:45pm.

Next feed in category: Wired