Remove Data Remove IPv6 Remove Network Remove Security
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

The rise of personal gadgets, the shift towards remote work, the BYOD trend , and advances in AI have all contributed to home networks becoming an extension of companies' cyber defense perimeters. However, many end-users do not recognize their home networks as extensions of their company's security boundaries.

Network 82
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

With this post we will dive a bit deeper into bogosity in networks, paying particular attention to the fundamental element of bogosity, the Bogon. We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Communications CTO Cyber Security Infrastructure'

IPv6 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. T-Mobile, for example, now has 89% of their infrastructure running on IPv6.

IPv6 60
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. Ivan is, of course, a well-known figure in the networking space, and publishes content at [link]. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258