article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Stopping bogons can not only help your enterprise but those you connect to. Enterprises have been filtering bogons for years. Bogons are bad for several reasons. Some did it better than others.

IPv6 242
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

9 New NIST Cybersecurity & Privacy Goals

SecureWorld News

NIST notes that there is "an urgent need to demonstrate the commercial viability of, and practical guidance for, secure IPv6-only enterprise deployment. The goal will be to ensure IoT devices are integrated into the security and privacy controls of federal information systems. Want to learn more?

IPv6 75
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

Passive DNS also has roles to play in mitigating phishing attacks, especially when integrated with operational enterprise solutions. Passive DNS also helps enable near real time detection of fraudulent changes to the DNS system, including attacks like cache poisoning.

Research 150
article thumbnail

Fountainhead: My Cloudy Nerdy Playlist for 2012

Fountainhead

Happy System Administrator Day - (one of my fave Animes) Features “The SysAdmin Song” above. Freakin brilliant tribute to IPv6. Enterprise Efficiency. Enterprise Efficiency. And this was just 2007. Cookie Computer Song – Classic Sesame Street. Not sure who sang, tho. Techy Poetry. I need more here. ).