article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Stopping bogons can not only help your enterprise but those you connect to. Enterprises have been filtering bogons for years. Bogons are bad for several reasons. Some did it better than others.

IPv6 242
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 82
article thumbnail

9 New NIST Cybersecurity & Privacy Goals

SecureWorld News

NIST will look for new approaches to encryption and data protection that will protect from a quantum computer's attack. NIST notes that there is "an urgent need to demonstrate the commercial viability of, and practical guidance for, secure IPv6-only enterprise deployment. Strengthening cryptographic standards and validation.

IPv6 74
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

Passive DNS also has roles to play in mitigating phishing attacks, especially when integrated with operational enterprise solutions. A key use case of passive DNS data is to take an IP address known to be malicious and then find all the domain names that Passive DNS sensors have mapped to that IP address.

Research 150
article thumbnail

Driving down the cost of Big-Data analytics - All Things Distributed

All Things Distributed

Driving down the cost of Big-Data analytics. The Amazon Elastic MapReduce (EMR) team announced today the ability to seamlessly use Amazon EC2 Spot Instances with their service, significantly driving down the cost of data analytics in the cloud. Hadoop is quickly becoming the preferred tool for this type of large scale data analytics.

Big Data 111