article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

However, many end-users do not recognize their home networks as extensions of their company's security boundaries. They often feel that using a company-provided laptop linked to the corporate security system is sufficient. As a result, they might not take enough measures to secure their other home devices.

Network 81
article thumbnail

Technology Short Take #51

Scott Lowe

I’m not sure if this falls here or into the “Cloud Computing/Cloud Computing” category, but Shannon McFarland—fellow co-conspirator with the Denver OpenStack Meetup group—has a nice article describing some design and deployment considerations for IPv6 in the OpenStack Kilo release.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 166

Scott Lowe

Nick Buraglio discusses IPv6 Unique Local Addressing (ULA). Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Rob Novak shares his experience in replacing Meraki with TP-Link Omada.

IPv6 74
article thumbnail

What matters about Matter, the new smart home standard

The Verge

Is Matter going to keep my smart home private and secure? We believe all smart home accessories should work together to provide the most choice and interoperability for customers without compromising security and privacy,” Apple spokesperson Jacqueline Roy told me. Home security sensors (motion, contact, CO / smoke detectors).

Apple 71
article thumbnail

Technology Short Take #65

Scott Lowe

Bruce Schneier asks the question that society has yet to answer (and may be afraid to answer): “…do we prioritize security over surveillance, or do we sacrifice security for surveillance?”. Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ).

Vmware 60
article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

ipv6 is designed to overcome the problems of ipv4 address exhaustion. So it would be very, very hard to scan for all the ipv6 addresses. We just scan the ipv4 space and ipv6 as a very large address space, which makes it very, a lot more difficult to scan. So fortunately, we were able to fingerprint it before the authentication.