To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. More and more, though, business leaders want to bring OT and IT together to drive better insights from the combined data set. While there are many advantages to merging IT and OT and having IIoT fall under IT ownership, it has a profound impact on the cybersecurity team because it introduces several new security threats.

5 firewall features IT pros should know about but probably don’t

Network World

Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make – a daunting wealth of possibilities that is difficult to keep track of.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How OPM Could Have Avoided the Data Breach

CTOvision

Recently, a data breach at the Office of Personnel Management ( OPM ) demonstrated once again the vulnerability of data and how even when an organization has seemingly deployed the right tools, security holes can be exploited to gain access to highly sensitive information. The latest data suggests that the attack was perpetrated by first stealing access credentials from KeyPoint , a government contractor that was hacked last year.

Cosentry Takes Managed Security Services Beyond Firewall

Data Center Knowledge

Midwest managed services provider beefs up portfolio of offerings following two data center acquisitions this year Read More. Cosentry Security Services

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Network World

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network. How edge networking and IoT will reshape data centers. How edge computing can help secure the IoT. All three products are positioned as remote-access communications and security devices.

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.

What is a firewall? How they work and how they fit into enterprise security

Network World

Firewalls been around for three decades, but they’ve evolved drastically to include features that used to be sold as separate appliances and to pull in externally gathered data to make smarter decisions about what network traffic to allow and what traffic to block. What is a firewall?

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic.

Protect SaaS Applications with Cloud-Based Security

Information Week

The massive amount of sensitive data being processed by SaaS applications requires new approaches to security, including cloud-based next generation firewalls

A Flicker Of Light: A new security stack points the path to safety

CTOvision

The last few years have been a difficult time for those who protect data. Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain.

How Big Data is Helping Improve Security

CTOvision

The security landscape is one fraught with danger right now. Data breaches are happening with alarming regularity as organizations of all types struggle to manage the ever evolving threats that are out there. According to the 2015 Verizon Data Breach Investigations Report, 85 percent of data breaches go undetected. The answer to all these ongoing security problems may be found in big data analytics. Protecting that data, therefore, becomes a top priority.

Outbound Traffic Filtering | Roadmap to Securing Your Infrastructure

Linux Academy

This is filtering provided at the network edge by a firewall with rules (ACLs) restricting what internal users are allowed to access. Some firewalls have the ability to filter by an application (layer 7 firewalls), but we’re going to concentrate on standard packet-filtering firewalls and their capabilities. Make Data Exfiltration Harder. Another benefit of outbound filtering is to make data exfiltration harder.

SMB 60

Firemon: Providing proactive security intelligence and governance over your IT

CTOvision

With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure.

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! As you try to simplify the user experience and reduce friction, the cost for security goes up. Can we overcome the friction of security?

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. IT Security

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

Mobile Causes Significant Issues for Data Services. Enterprise applications are largely about data: accessing data from anywhere and performing transactions that effect data. While many of the lessons we have learned from our web-based systems apply to mobile apps, there are some interesting new challenges in the way that we manage our data. With that demand for agility comes a significant concern about how to handle rapid data model changes.

IDG Contributor Network: Barracuda protects industrial IoT with network-based firewall

Network World

What security resources are available? How do IoT firewalls protect against such threats? Many industrial systems use TCP Port 502, which allows two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered on port 502 in the same order in which they were sent. Many industrial IoT systems have open doors that create unintended vulnerabilities.

Infoblox Unveils Secure DNS Server

Data Center Knowledge

DNS servers inside the data center have become targets because firewalls don’t inspect DNS queries. SecurityInfoblox unveiled an appliance that can detect and block DNS attacks. Read More.

Juniper bolsters wireless security; fights against encrypted malicious threats

Network World

Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats. With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center.

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative

CTOvision

This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. Over the past 15-20 years the industry has invested billions in pursuit of automated security layers (e.g. firewalls, endpoint protection, intrusion detection), but attempts at automating the human interaction part of the process have fallen short. Maturing Security Posture and Mitigating Concerns with FireMon (ctovision.com).

Maturing Security Posture and Mitigating Concerns with FireMon

CTOvision

According to Greg Young of the Gartner Group, many organizations are taking the “adopt first, secure later” approach to the cloud. Currently, IT organizations are initially finding ways to meet emerging business requirements, and then realizing the necessity of identifying additional security controls. A good deal of effort goes into migration of existing network security infrastructure, and more importantly network security policies, to support cloud services.

Cisco security spotlights Microsoft Office 365 e-mail phishing increase

Network World

It’s no secret that if you have a cloud-based e-mail service, fighting off the barrage of security issues has become a maddening daily routine.

Spending On Application Security Tools To Grow Over 16% Annually

Forrester's Customer Insights

In fact, web application was the top data breach type, accounting for almost one in five confirmed data breaches, according to Verizon’s 2018 Data Breach Investigations Report. Security and risk decision makers are spending more on application security and increasing deployment of application […]. application security web application firewallsHackers go after web applications because they are typically the most vulnerable.

The Innerworkings of a Security Operations Center

CTOvision

Cyber security breaches are becoming common news. The role of security is becoming more and more important in the IT sector. To solve security issues and to provide a rapid solution and response to security related problems, most of the companies are setting up Security Operations Center (SOC). SOC can be simply defined as a centralized unit that deals with security on an organizational level. 24/7 security monitoring. Cyber Security

How Does Cloud Endpoint Security Works?

Galido

Information Technology Blog - - How Does Cloud Endpoint Security Works? This is so, because they don’t have the resources and firewalls to withstand these cyber-attacks. securities and the U.S. Understanding Cloud Endpoint Security. Cloud Security

Data Security and its Importance on the Internet

Galido

Information Technology Blog - - Data Security and its Importance on the Internet - Information Technology Blog. Hacking and data breaches are a common thing today, especially with the rise of open source platforms and electronic transactions. Turn on your firewall.

What is microsegmentation? How getting granular improves network security

Network World

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs. Companies have relied on firewalls , virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years.

Protecting Data with Quantum Technology

CTOvision

From mobile to cloud, our data is everywhere, feeding seemingly endless and varied security attacks, from the recent Panama Papers leak to repeated ransomware attacks on hospitals. People need new ways to protect and secure their data wherever it is. However, while quantum technology can be seen as a threat to security, it can also enhance it. Commercial, cost-effective, quantum random numbers are available today for integration in security solutions.

Data 200

Google, Facebook, and Twitter halt government data requests after new Hong Kong security law

The Verge

Google, Facebook, and Twitter are pausing the processing of data requests from the Hong Kong government as they review a new security law that went into effect on July 1st. Illustration by Alex Castro / The Verge.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

How Small Businesses Can Protect Their Data

Galido

Information Technology Blog - - How Small Businesses Can Protect Their Data - Information Technology Blog. In today’s digital world, data is key for all businesses and every owner needs to consider how they can protect this data from cybercriminals. Firewalls. Backup Data.

The Perfect and Continuous Storm: Understanding the Cyber Implications of the Regulatory Governance For Security Advisors

CTOvision

Founder and Chief Security Strategist at eSentire Eldon Sprickerhoff recently penned a blog post titled " The Perfect Storm: Understanding the Implications of the Regulatory Governance Spotlight." In this piece he underscored the compliance regime around registered investment advisors (RIA), a key descriptor used by the Security and Exchange Commission and other regulatory bodies to refer to those that give advice about securities.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. First off, there are many different jobs within information security.

7 IT Security Risks for Small Businesses

Galido

Information Technology Blog - - 7 IT Security Risks for Small Businesses - Information Technology Blog. Here are top IT security risks you should avoid or manage before they take your business down. Or do you take security for a granted just because you don’t have a huge volume of data?

How to Protect Your WooCommerce Site from Hackers and Secure Your Customer Data?

Galido

Information Technology Blog - - How to Protect Your WooCommerce Site from Hackers and Secure Your Customer Data? How Can I Secure My WooCommerce Store? A single data theft incidence can cause lethal damage. Choosing the right web host is crucial for security.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

Steps for Performing a Cyber Security Assessment

Galido

Information Technology Blog - - Steps for Performing a Cyber Security Assessment - Information Technology Blog. A chief information security officer for reviewing network architecture. Product management for guaranteeing product security as it undergoes the development cycle.

15 Sure-Fire Ways to Secure Your Blog In 2018

Galido

Information Technology Blog - - 15 Sure-Fire Ways to Secure Your Blog In 2018 - Information Technology Blog. Here are top measures you should take to secure your blog in 2018. Have secure login credentials. Add security plugins. Firewall your website. Security

Cybersecurity vendor that protects firms from data breaches hit by data breach

CTOvision

You know it’s a bad day for cybersecurity when a leading provider of internet firewall services that helps safeguard websites from malicious attacks suffers from a security breach of its own.

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. When you read of a government agency being penetrated or a corporation losing data I can almost always guarantee you that they have failed to implement and measure these controls. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers.