article thumbnail

Does your cloud-access security broker support IPv6? It should.

Network World

Cloud access security brokers ( CASB ) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. Related: What is IPv6, and why aren’t we there yet? To read this article in full, please click here (Insider Story)

IPv6 135
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Stopping bogons can not only help your enterprise but those you connect to. Enterprises have been filtering bogons for years. Bogons are bad for several reasons. Some did it better than others.

IPv6 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258
article thumbnail

9 New NIST Cybersecurity & Privacy Goals

SecureWorld News

NIST notes that there is "an urgent need to demonstrate the commercial viability of, and practical guidance for, secure IPv6-only enterprise deployment. This is one of a few projects it is working on in the area of trustworthy networks.

IPv6 79
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

Passive DNS also has roles to play in mitigating phishing attacks, especially when integrated with operational enterprise solutions. In DNS, this is known as an "A" record and is one of many different record types including, but not limited to AAAA (IPv6), MX (mail), NS (nameserver), and TXT (text).

Research 150