article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on. However, to use CAC with an Apple iPhone, you need to buy a sled – an iPhone case with integrated card reader. Userids and passwords are almost free.

Security 249
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

But despite those expenditures, there have already been at least 13 major data breaches, including at Apple, Meta and Twitter. For example, he says, web application firewalls don’t only protect applications but cut networking costs by reducing spurious and malicious traffic. to reach more than $188.3 billion this year.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #63

Scott Lowe

Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Personally, I think it’s an apples-to-oranges comparison, since Kubernetes is more than just a scheduler (think about replication controllers and services and such), but to each his own. Servers/Hardware.

Vmware 60
article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

It's probably best to think of it as a second Great Firewall—which severely limits what content goes in and out of Russia—rather than a "Runet" as some have called it. Both Apple and Google have removed RT apps. Russia has been working on creating its own isolated Internet for some time—tests have been conducted since at least 2017.

article thumbnail

Technology Short Take #77

Scott Lowe

There was a fair amount of wailing and gnashing of teeth when Apple updated the MacBook Pro line with the Touch Bar. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Some people love it, others absolutely hate it. Not sure what a bastion host is? Read this post.)

Linux 60
article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. I enjoyed Adam Leventhal’s evaluation of APFS , the new file system announced at the most recent Apple WWDC. Cloud Computing/Cloud Management.

Linux 60
article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

Today, the service provider houses over 1,425 virtual servers running on 70 industrystandard Egenera servers, 370 terabytes of storage and 1,250 virtualized firewalls. Servers from the industry’s largest vendors were also ruled out since their legacy architectures made virtualization and resource sharing impossible.