Cybersecurity

Networkworld

Enterprises opt for different microsegmentation architectures

It’s a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it’s working. Here are their stories.Distributed firewalls via VMware NSX
Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. “Above all, we protect our databases,” he says. “We do anything and everything to keep uninvited guests out of our databases.”To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!UPDATE 4.17AT&T reported that Email traffic is down 25% as more people opt for phone and video calls.  Video conferencing is on the rise with more than 470k Webex Meeting Calls on April 9, the highest during the COVID-19 pandemic.  It also stated instant messaging, including text traffic from messaging apps and platforms, has slightly declined since the week prior, but overall is up nearly 60%.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

How microsegmentation architectures differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Microsegmentation architecture choices and how they differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

Cisco says to patch critical UCS security holes now

Cisco has posted a package of 17 critical security warnings about authentication vulnerabilities in its Unified Computing System that could let attackers break into systems or cause denial of service troubles.Specifically the problems are with Cisco’s UCS Director and Express which let customers build private-cloud systems and support automated provisioning processes and orchestration to optimize and simplify delivery of data-center resources, the company said.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

IBM extends z15 mainframe family, intensifies Linux security

IBM continued to reshape the mainframe with an eye toward further integrating it within hybrid clouds and securing Linux-based workloads.On the hardware side, IBM rolled out two entry-level, 19” single-frame, air-cooled platforms, the  z15 Model T02 and LinuxONE III Model LT2. The new machines are extensions of the IBM z15 family that Big Blue rolled out in September of last year. To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

Letter from the CEO: A time of kindness and compassion

Dear Customers, Together, we are facing a truly unprecedented situation and we have all had to adapt to the new reality. The global coronavirus pandemic is affecting our families, our communities, our organizations – indeed, it affects our perspective and way of life. As you certainly have too, at Trend Micro we have been busy…
The post Letter from the CEO: A time of kindness and compassion appeared first on . Read More HERE…

Read More
TrendMicro

What do serverless compute platforms mean for security?

By Kyle Klassen Product Manager – Cloud Native Application Security at Trend Micro Containers provide many great benefits to organizations – they’re lightweight, flexible, add consistency across different environments and scale easily. One of the characteristics of containers is that they run in dedicated namespaces with isolated resource requirements. General purpose OS’s deployed to run…
The post What do serverless compute platforms mean for security? appeared first on . Read More HERE…

Read More