[*] [-] [-] [x] [A+] [a-]  
[l] at 11/14/19 1:26pm
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason James, CIO of Net Health, joins Juliet to discuss why attackers target healthcare organizations, Google's Project Nightingale and what it means for a tech giant to have access to the medical data of millions of people.

[Category: Security, Health Care Industry]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/13/19 1:07pm

Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.

Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel’s Cascade Lake chips.

[Get regularly scheduled insights by signing up for Network World newsletters.]

Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.

To read this article in full, please click here

[Author: Sandra Henry-Stocker] [Category: Linux, Hardware, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/13/19 9:27am
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click "buy now".

[Author: DealPost Team] [Category: VPN, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/12/19 5:55am

It seems the latest buzzword coming from those analysts at Gartner is SASE (pronounced “sassy”), which stands for “Secure Access Service Edge.” Network World has published several articles recently to explain what SASE is (and perhaps isn’t). See Matt Conran’s The evolution to Secure Access Service Edge (SASE) is being driven by necessity as well as Zeus Kerravala’s article How SD-WAN is evolving into Secure Access Service Edge.

To read this article in full, please click here

[Author: Linda Musthaler] [Category: Networking, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/7/19 11:30am
Use these techniques to limit attackers’ ability to compromise systems and websites.

[Category: Security, Windows]

[*] [+] [-] [x] [A+] [a-]  
[l] at 11/7/19 10:20am
Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network.

[Category: Security, Printers, Hacking, Vulnerabilities]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/6/19 6:10am

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.

The new products, which include a raft of new security features as well a new class of switches and a cellular gateway will help Meraki address customers who perhaps don’t have the IT expertise nor staffing to support the increasing number of devices that need to be managed, said Lawrence Huang, vice president of product management at Cisco Meraki.

Network pros react to new Cisco certification curriculum

“Threat vectors are evolving and the way customers need to protect themselves need to evolve as well – how customers support applications and IoT devices exemplify the idea its not just one perimeter that needs protecting but a collection of micorperimenters,” Huang said.

To read this article in full, please click here

[Author: Michael Cooney] [Category: Networking, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/5/19 2:09pm
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has been done to patch these vulnerabilities. They both join Juliet to discuss how Kubecka discovered this information and what it means for national security and passenger safety.

[Category: Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/5/19 1:09pm

VMware is moving quickly to meld its recently purchased Carbon Black technology across its product lines with an eye toward helping users protect their distributed enterprises.

VMware just closed the $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black in October and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources.

More about edge networking

To read this article in full, please click here

[Author: Michael Cooney] [Category: Networking, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 11/3/19 10:00pm

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.

On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.

[Get regularly scheduled insights by signing up for Network World newsletters.]

Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.

To read this article in full, please click here

[Author: Linda Musthaler] [Category: Networking, VPN, SD-WAN, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 10/30/19 9:53am
A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

[Author: Jon Gold] [Category: Internet, Internet of Things, Technology Industry, Security, Carriers]

[*] [-] [-] [x] [A+] [a-]  
[l] at 10/30/19 4:00am
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

[Category: Windows, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 10/28/19 4:36pm

SASE, pronounced "sassy," stands for secure access service edge, and it's being positioned by Gartner as the next big thing in enterprise networking. The technology category, which Gartner and other network experts first introduced earlier this year, converges the WAN edge and network security into a cloud-based, as-a-service delivery model. According to Gartner, the convergence is driven by customer demands for simplicity, scalability, flexibility, low latency, and pervasive security.

SASE brings together security and networking

A SASE implementation requires a comprehensive technology portfolio that only a few vendors can currently deliver. The technology is still in its infancy, with less than 1% adoption. There are a handful of existing SD-WAN providers, including Cato Networks, Juniper, Fortinet and Versa, that are expected to compete in the emerging SASE market. There will be other SD-WAN vendors jumping on this wagon, and the industry is likely to see another wave of startups. 

To read this article in full, please click here

[Author: Zeus Kerravala] [Category: Networking, SD-WAN, Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 10/28/19 12:45pm

The major U.S. mobile carriers are eager participants in the rise of IoT, and it’s tough to argue that they don’t have a major role to play – the ability to connect largely anywhere, coupled with the ability to handle high-throughput applications, means that cellular data can be an attractive option for the connectivity piece of an IoT deployment.

AT&T announced a deal with Vodafone last week to interconnect their respective narrow-band IoT networks across the Atlantic, mating AT&T’s U.S. coverage with Vodafone’s in western Europe. That means that businesses with NB-IoT deployments in those areas can use that single network to connect their entire implementation. Not to be outdone, Sprint announced that it, too, is rolling out NB-IoT on its Curiosity IoT platform. Sprint shared its plans during a panel discussion at Mobile World Congress in Los Angeles last week.

To read this article in full, please click here

[Author: Jon Gold] [Category: Internet of Things, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 9/17/19 4:00am
This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

[Author: John Breeden II] [Category: Security]

[*] [-] [-] [x] [A+] [a-]  
[l] at 8/29/19 8:06am
Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

[Author: IT Central Station] [Category: Networking, Access Control, Security]

[*] [+] [-] [x] [A+] [a-]  
[l] at 10/23/18 4:00am

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.

Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

Today’s enterprise firewalls must be able to secure an increasingly complex network that includes traditional on-premises data center deployments, remote offices and a range of cloud environments. Then you have to implement and test the firewall once it's installed. Perhaps the only element more complex than configuring, testing and managing a next-generation firewall is the decision-making process regarding which product to trust with your enterprise security.

To read this article in full, please click here

(Insider Story)

[Author: Sheryl Hodge] [Category: Firewalls, Security, Networking, IDG Insider]

[*] [+] [-] [x] [A+] [a-]  
[l] at 7/27/18 9:06am

When selecting VPN routers, small businesses want ones that support the VPN protocols they desire as well as ones that fit their budgets, are easy to use and have good documentation.

We looked at five different models from five different vendors: Cisco, D-Link, and DrayTek, Mikrotik and ZyXEL. Our evaluation called for setting up each unit and weighing the relative merits of their price, features and user-friendliness.

[ Learn who's developing quantum computers.]

Below is a quick summary of the results:

To read this article in full, please click here

(Insider Story)

[Author: Eric Geier] [Category: Networking, Router, Security, Cisco Systems, Small Business, IDG Insider]

[*] [-] [-] [x] [A+] [a-]  
[l] at 5/9/18 4:57pm

"I am all about useful tools. One of my mottos is 'the right tool for the right job.'" –Martha Stewart

If your "right job" involves wrangling computer networks and figuring out how to do digital things effectively and efficiently or diagnosing why digital things aren't working as they're supposed to, you've got your hands full. Not only does your job evolve incredibly quickly becoming evermore complex, but whatever tools you use need frequent updating and/or replacing to keep pace, and that's what we're here for; to help in your quest for the right tools.

[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]

We've done several roundups of free network tools in the past, and since the last one, technology has, if anything, sped up even more. To help you keep up, we've compiled a new shortlist of seven of the most useful tools that you should add to your toolbox.

To read this article in full, please click here

(Insider Story)

[Author: Mark Gibbs] [Category: Network Management, Security, Infrastructure, Networking, IDG Insider]

As of 11/15/19 12:44am. Last new 11/13/19 1:38pm.

First feed in category: Scientific American