Security

Networkworld

What happens if IoT security doesn’t get solved?

Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey, 45 percent of Internet of Things (IoT) buyers say “concerns about security remain a significant barrier and are hindering the adoption of IoT devices.” Worries over IoT security are hardly news, of course. I’ve been writing about them here on Network World for a while, and a quick internet search for IoT security rains down more than a million hits.To read this article in full, please click here READ MORE HERE…

Read More
Networkworld

SDNs and NFV are complementary and core components of modernized networks

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect.  In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case.Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both.[ For more on SDN see where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]
What is software-defined Networking
SDNs are a fundamentally different way to think about networks.  Technically, SDNs can be defined as the separation of the management, control and data-forwarding planes of networks.  Many people, including technical individuals read that definition and say, “So what?”, but the separation of these planes has a profound impact on networks and enables things that have never been done before.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware?

You might have seen reports that the FBI is warning home users of a new foreign cyber-attack campaign targeted at your routers and network-attached storage (NAS) devices. Here’s a breakdown of exactly what has happened, and what you need to do to keep your home IT systems safe and secure. What is VPNFilter? This is…
The post FBI Router Reboot Warning: How Do I Stay Safe from the New VPNFilter Malware? appeared first on . Read More HERE…

Read More
TrendMicro

AV-TEST’s April 2018 Windows Home User Test Report Shows 100% Protection Result and Top Product Award for Trend Micro Internet Security

Maintaining its Top Product protection rating, Trend Micro Internet Security 12.0 (2018) continues to show 100% Protection results in tests conducted by the internationally respected testing lab AV-TEST.org. In its Mar-Apr 2018 test of 18 endpoint security products on Windows 10, the latest release of Trend Micro Internet Security blocked 100% of 196 “real-world” 0-day…
The post AV-TEST’s April 2018 Windows Home User Test Report Shows 100% Protection Result and Top Product Award for Trend Micro Internet Security appeared first on . Read More HERE…

Read More
Networkworld

Cato Networks adds threat hunting to its Network as a Service

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 28, 2018

I ended up at an urgent care clinic earlier this week and found out I have strep throat. The doctor who examined me asked me what medicine I had taken prior to my visit to help alleviate my throat pain, to which I replied, “I took a multi-symptom liquid medicine because the pain was keeping…
The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 28, 2018 appeared first on . Read More HERE…

Read More
Networkworld

Study shows admins are doing a terrible job of patching servers

Open source has taken over the server side of things, but admins are doing a terrible job of keeping the software patched and up to date.Black Duck Software, a developer of auditing software for open-source security, has released its annual Open Source Security and Risk Analysis, which finds enterprise open source to be full of security vulnerabilities and compliance issues.[ For more on IoT security see our corporate guide to addressing IoT security concerns. | Get regularly scheduled insights by signing up for Network World newsletters. ]
According to the study, open-source components were found in 96% of the applications the company scanned last year, with an average of 257 instances of open source code in each application.To read this article in full, please click here READ MORE HERE…

Read More
TrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 21, 2018

Not that I needed to the reminder, but the influx of emails with the subject line “Updates to our Privacy Policy” from companies that I deal with (and some that I’ve never heard of!) means that TODAY is the day! The General Data Protection Regulation (GDPR) has officially taken effect. Originally adopted by the European…
The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of May 21, 2018 appeared first on . Read More HERE…

Read More