To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. More and more, though, business leaders want to bring OT and IT together to drive better insights from the combined data set. While there are many advantages to merging IT and OT and having IIoT fall under IT ownership, it has a profound impact on the cybersecurity team because it introduces several new security threats.

Cosentry Takes Managed Security Services Beyond Firewall

Data Center Knowledge

Midwest managed services provider beefs up portfolio of offerings following two data center acquisitions this year Read More. Cosentry Security Services

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Spending On Application Security Tools To Grow Over 16% Annually

Forrester IT

In fact, web application was the top data breach type, accounting for almost one in five confirmed data breaches, according to Verizon’s 2018 Data Breach Investigations Report. Security and risk decision makers are spending more on application security and increasing deployment of application […]. application security web application firewallsHackers go after web applications because they are typically the most vulnerable.

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Network World

Cisco is warning organizations with remote users that have deployed a particular Cisco wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network. How edge networking and IoT will reshape data centers. How edge computing can help secure the IoT. All three products are positioned as remote-access communications and security devices.

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

What is a firewall? How they work and how they fit into enterprise security

Network World

Firewalls been around for three decades, but they’ve evolved drastically to include features that used to be sold as separate appliances and to pull in externally gathered data to make smarter decisions about what network traffic to allow and what traffic to block. What is a firewall?

How OPM Could Have Avoided the Data Breach

CTOvision

Recently, a data breach at the Office of Personnel Management ( OPM ) demonstrated once again the vulnerability of data and how even when an organization has seemingly deployed the right tools, security holes can be exploited to gain access to highly sensitive information. The latest data suggests that the attack was perpetrated by first stealing access credentials from KeyPoint , a government contractor that was hacked last year.

Outbound Traffic Filtering | Roadmap to Securing Your Infrastructure

Linux Academy

This is filtering provided at the network edge by a firewall with rules (ACLs) restricting what internal users are allowed to access. Some firewalls have the ability to filter by an application (layer 7 firewalls), but we’re going to concentrate on standard packet-filtering firewalls and their capabilities. Make Data Exfiltration Harder. Another benefit of outbound filtering is to make data exfiltration harder.

SMB 40

Protect SaaS Applications with Cloud-Based Security

Information Week

The massive amount of sensitive data being processed by SaaS applications requires new approaches to security, including cloud-based next generation firewalls

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic.

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.

Infoblox Unveils Secure DNS Server

Data Center Knowledge

DNS servers inside the data center have become targets because firewalls don’t inspect DNS queries. SecurityInfoblox unveiled an appliance that can detect and block DNS attacks. Read More.

IDG Contributor Network: Barracuda protects industrial IoT with network-based firewall

Network World

What security resources are available? How do IoT firewalls protect against such threats? Many industrial systems use TCP Port 502, which allows two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered on port 502 in the same order in which they were sent. Many industrial IoT systems have open doors that create unintended vulnerabilities.

A Flicker Of Light: A new security stack points the path to safety

CTOvision

The last few years have been a difficult time for those who protect data. Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain.

How Big Data is Helping Improve Security

CTOvision

The security landscape is one fraught with danger right now. Data breaches are happening with alarming regularity as organizations of all types struggle to manage the ever evolving threats that are out there. According to the 2015 Verizon Data Breach Investigations Report, 85 percent of data breaches go undetected. The answer to all these ongoing security problems may be found in big data analytics. Protecting that data, therefore, becomes a top priority.

Firemon: Providing proactive security intelligence and governance over your IT

CTOvision

With this post we are initiating coverage of Firemon, provider of proactive security intelligence and governance capabilities. Firemon enables enterprises to continuously analyze, visualize and improve the capabilities of your existing network security infrastructure.

Cisco security spotlights Microsoft Office 365 e-mail phishing increase

Network World

It’s no secret that if you have a cloud-based e-mail service, fighting off the barrage of security issues has become a maddening daily routine.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

When Big Data Changed Security - Chuck's Blog

Chuck's Blog - EMC

« The Big Data Storymap | Main. When Big Data Changed Security. This morning, EMC announced a new landmark product: RSA Security Analytics.   As a result, information security concerns have quickly escalated beyond IT to the board of directors. 

How Does Cloud Endpoint Security Works?

Galido

Information Technology Blog - - How Does Cloud Endpoint Security Works? This is so, because they don’t have the resources and firewalls to withstand these cyber-attacks. securities and the U.S. Understanding Cloud Endpoint Security. Cloud Security

Security requires long haul planning

Cloud Musings

This framework, in place since 2000, gave blanket permission to data transfers from the European Union to the United States. The ruling means that national data protection authorities can now review such data transfers on an individual basis.

Dell 255

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! As you try to simplify the user experience and reduce friction, the cost for security goes up. Can we overcome the friction of security?

What is microsegmentation? How getting granular improves network security

Network World

Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs. Companies have relied on firewalls , virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years.

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

All this leads to CIOs who are going through each day with a false sense of security. companies that have at least 500 employees rely on some form of security products in order to protect their networks.

Why CIOs May Be The Company's Biggest Security Risk (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

Your IT department has lots and lots of data on its computers that bad people would like to get their hands on. Thank goodness your company has taken care to secure every way that there is for outsiders to get into your company’s network.

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

Mobile Causes Significant Issues for Data Services. Enterprise applications are largely about data: accessing data from anywhere and performing transactions that effect data. While many of the lessons we have learned from our web-based systems apply to mobile apps, there are some interesting new challenges in the way that we manage our data. With that demand for agility comes a significant concern about how to handle rapid data model changes.

Data Security and its Importance on the Internet

Galido

Information Technology Blog - - Data Security and its Importance on the Internet - Information Technology Blog. Hacking and data breaches are a common thing today, especially with the rise of open source platforms and electronic transactions. Turn on your firewall.

How Small Businesses Can Protect Their Data

Galido

Information Technology Blog - - How Small Businesses Can Protect Their Data - Information Technology Blog. In today’s digital world, data is key for all businesses and every owner needs to consider how they can protect this data from cybercriminals. Firewalls. Backup Data.

Heimdal PRO Review

Doctor Chaos

Heimdal PRO – the security solution for everyone The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber attacks.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. First off, there are many different jobs within information security.

Exploiting IT Analytics to Create a ‘Human Layer’ Security Initiative

CTOvision

This workshop will discuss the final understanding and verification of a security incident that ultimately requires human interpretation and decision. Over the past 15-20 years the industry has invested billions in pursuit of automated security layers (e.g. firewalls, endpoint protection, intrusion detection), but attempts at automating the human interaction part of the process have fallen short. Maturing Security Posture and Mitigating Concerns with FireMon (ctovision.com).

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely.

Steps for Performing a Cyber Security Assessment

Galido

Information Technology Blog - - Steps for Performing a Cyber Security Assessment - Information Technology Blog. A chief information security officer for reviewing network architecture. Product management for guaranteeing product security as it undergoes the development cycle.