I’ll assume that you’ve watched the Indiana Jones movie Raiders of the Lost Ark – if not, be warned, there are spoilers in the next sentence. At the end of the movie, the Ark is reported to be in a place that is “very safe.” To which Indy replies, “From whom?” Later, the scene cuts to… Read more »
Category: Security
Network Visibility is A Security Must-Have
Given the trends of massive growth in bandwidth, deployment of large enterprise data centers, and significant adoption of cloud-based applications, enterprise networks have become more challenging to secure and manage. Organizations now have a reliance on the network for critical business functions, including remote access to data center and cloud-based applications. This increased reliance on the network has… Read more »
Secure Email Gateways: Perimeter Security for the Mailbox
In the business world, 90 trillion emails are being sent each year. According to Kaspersky research, over 57% of those emails were classified as spam and malware. This makes email a very real threat vector that can infiltrate a user’s endpoint, branch offices, and even the data center. It’s important as ever to secure employee and user inboxes, and there have been continual advancements in security surrounding products that identify threats and… Read more »
Ransomware is A Real Threat
Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. We’ve all heard stories describing the severe impacts organizations face after being targeted by ransomware. Ransomware is a big business for organized crime rings and, as some suspect, even state-sponsored agencies. According to industry experts, it’s estimated ransomware ransacked $1B in… Read more »
How Do You Protect Your Business When the Threat Landscape Is Always Evolving?
Staying ahead of the curve when it comes to security attacks can be a challenge many find to be nearly impossible to achieve. But why is it so difficult? Every day, attacks targeting juggernauts of industry are featured in breaking news. An example is the recent “Wannacry” ransomware attack, which affected thousands of computers all… Read more »
BYOD: Is it Worth the Risk?
The Bring Your Own Device (BYOD) phenomenon has become a highly debated topic in many organizations. While some enterprises are fully enveloped in the BYOD trend, others are hesitant to adopt this new strategy because of the numerous risks associated with it. Regardless, here is what you need to know to be BYOD-ready.
High Severity GnuTLS bug
On May 23rd, Nikos Mavrogiannopoulo (one of the primary authors of the GnuTLS library) submitted a commit identifying the potential for “memory corruption” during the TLS/SSL handshake process. This specific bug makes it possible to initiate a server-based attack on a client system by corrupting its memory using a specially crafted ServerHello message.
Heartbleed: A Case For Two-Factor Authentication
By now you’ve probably heard about a major vulnerability in the OpenSSL Project’s implementation of SSL known as Heartbleed. If you’re not familiar with SSL, it is a protocol designed to secure communication between an end-user (client) and application (server) using cryptography and keys intended to make it difficult to intercept and read protected traffic…. Read more »
DDoS Ammunition: Are you protected?
Saar here, resident engineer at Myriad Supply. Today I’ll be discussing DDoS ammunition. The FFIEC gives “recommendations” to banking institutions. This is a non-binding recommendation, and there is no law per say that says you must have DDoS protection. However, if someone suffers financial damages due to a DDoS attack on a bank, that person… Read more »
Controller, Cloud Managed and Standalone WiFi Deployments, Oh My!
Hello all, the speaking. In the WiFi world, there are three major types of wireless deployments. These are, as the title says, Controller Based, Cloud Managed, and Standalone; They are all different, and each one has its correct application, benefits, and vices. It has come to my attention that the differences among these groups… Read more »
Recent Comments