With the increase in vulnerabilities in operational technology infrastructure, it's important to deploy unidirectional hardware gateways to restrict entry into OT networks, says Ajit Jha of L&T Technology Services.
The explosion in the growth and diversity of devices linked to networks as a result of the internet of things and BYOD makes it more challenging to manage network security, says Wallace Sann of ForeScout.
At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has sinkholed the control domain for the router botnet, which should help contain the potential damage.
If operational technology systems need to get connected to IT systems, it's essential to have tight controls on the network, says Lam Kwok Yan, professor of computer science and engineering at Nanyang Technological University in Singapore.
The rapid rise of cloud and mobile has created increased complexities for IT including managing the security risks as well as end user expectation. The question is, how to take advantage of the agility the cloud affords you while securing your applications in the cloud from Internet threats and still give users easy,...
Legacy, perimeter-centric models of information security are of no use in today's digital businesses, according to a Forrester report sponsored by Akamai, as they are no longer bounded by the four walls of their corporation. Instead, CIOs must move toward a Zero Trust approach to security that is data- and...
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
Cybersecurity pros need to apply the Darwinian approach of "survival of the fittest" to cybersecurity to navigate the risk landscape and raise the industry baseline for security, says Dan Schiappa of Sophos.
Does your organization need to improve security without compromising network speed and availability?
Download this whitepaper and learn how to:
Boost network availability and security as well as consolidate and optimize security monitoring;
Protect your organization against failures while maximizing the...
By serving as central orchestrators and clearinghouses for security activity across an organization and providing granular visibility into all segments of the network, next-generation network packet brokers can better tackle threats while reducing costs.
Download this whitepaper to:
See how to simplify security so...
The GDPR regulation will be enforced beginning May 25, 2018 and for many organizations, the initial transition to GDPR compliance is likely to be a lengthy and challenging process that will require regular reevaluation based on continued reassessment of the risks.
The role of network security in preventing...
With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.
Five days after a ransomware outbreak crypto-locked city systems, Atlanta has advised its 8,000 employees that they can once again boot their PCs and printers. But information security experts warn that the city's infrastructure still appears to have easily exploitable misconfigurations.
Many models of security still have their roots in older infrastructure. But with the death of the network perimeter and the rapidly approaching end to passwords, there has to be a new view of the security landscape to prepare for this future - especially with new devices coming in ever-changing forms.