Securing your operations? Don’t forget your hardware

Securing your operations? Don’t forget your hardware

When you think about cybersecurity, I bet you think about protection from malware – pieces of software that can infiltrate industrial resources and steal data or disrupt operations. Such security requires sophisticated firewalls, deep packet inspection, intrusion detection and prevention, and a robust network that can segment operations and limit any malware’s spread. That’s great, but you might be ignoring vulnerabilities that can arise from deficiencies in the underlying hardware. If you are, you would…

Read More

More malware-infested apps found in the Google Play store

More malware-infested apps found in the Google Play store

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware. French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and how it signs up users to premium services. The Autolycos malware, which shares similarities to the Joker spyware, spies on…

Read More

Cisco DNA Center is now FIPS 140-2 certified

Cisco DNA Center is now FIPS 140-2 certified

Contributing Author: Marcus Moffett, CTO and Senior Director of Engineering and Architecture, U.S. Public Sector Digital transformation, various regulations, increasing frequency and sophistication of cyber security threats, and new paradigms such as IoT and hybrid work are transforming enterprise networks and making them more complex to manage. These networks need a modern network management system to run the network efficiently through intelligent automation, securely through easy-to-administer policy management and enforcement, and reliably through proactive and…

Read More

Romanian Man Accused of Distributing Gozi Virus Extradited to US

Romanian Man Accused of Distributing Gozi Virus Extradited to US

A Romanian man accused of distributing a computer virus that hit over 1 million computers has been extradited to the US. The suspect, 37-year-old Mihai Paunescu, allegedly ran a hosting service that helped distribute the Gozi virus, which caused tens of millions of dollars of financial losses worldwide.  First discovered in 2007, the Gozi virus was able to go undetected as it stole bank account information from computers – 40,000 of which were in the US,…

Read More

Over 50% of enterprises worry about supply chain risks

Over 50% of enterprises worry about supply chain risks

Over 50% of enterprises worry about supply chain risks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

MTTI Means ROI for the Business

MTTI Means ROI for the Business

While networks are getting more complex, the infrastructure that IT supports tends to grow at a relatively steady rate. However, in the past few years the footprint IT is responsible for has grown exponentially. Because of this, IT is often the first to be blamed when apps are slow or network performance drops. The role of IT has transitioned to one of defense where guilty-until-proven-innocent is the norm. Unfortunately, this has brought rise of a…

Read More

Enhancing Government Outcomes with Integrated Private 5G

Enhancing Government Outcomes with Integrated Private 5G

Enhancing Government Outcomes with Integrated Private 5G Private 5G is now ready to be part of your enterprise wireless communications transformation strategy. While there has been extensive focus on ultra-wideband gigabit speeds from public Mobile Network Operators, there are even greater government expectations for 5G capabilities to assure the quality of service and empower new mission-critical use cases. 3GPP standards are enabling delivery of capabilities in three strategic 5G areas: enhanced Mobile Broadband (eMBB), Ultra-Reliable…

Read More

3 Reasons Network Ops Should Focus on User-Experience

3 Reasons Network Ops Should Focus on User-Experience

Increasing cloud adoption, whether because of moving internal apps to IaaS and PaaS or migrating to SaaS solutions, fundamentally alters the job of IT and network operations teams. While NetOps teams have historically focused on rolling out traditional on-premises infrastructures, they now find themselves supporting applications that are third-party operated and require a different set of network skills. With this environment as a backdrop, here are three reasons your network team should be more experience-centric….

Read More

3 areas of focus for cybersecurity professionals in 2022

3 areas of focus for cybersecurity professionals in 2022

3 areas of focus for cybersecurity professionals in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The true meaning of zero trust

The true meaning of zero trust

The true meaning of zero trust | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2,828 2,829 2,830 2,831 2,832 4,077