Remove Firewall Remove IPv6 Remove Network Remove Security
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

The rise of personal gadgets, the shift towards remote work, the BYOD trend , and advances in AI have all contributed to home networks becoming an extension of companies' cyber defense perimeters. However, many end-users do not recognize their home networks as extensions of their company's security boundaries.

Network 81
article thumbnail

Bogons: Do not let them in or through your networks

CTOvision

With this post we will dive a bit deeper into bogosity in networks, paying particular attention to the fundamental element of bogosity, the Bogon. We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bogons never get to your enterprise. Filtering private IP addresses requires only a few rules.

IPv6 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. Ivan is, of course, a well-known figure in the networking space, and publishes content at [link]. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 84
article thumbnail

How to eliminate the default route for greater security

Network World

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Also on Network World: IPv6 deployment guide ; What is edge computing and how it’s changing the network? +

IPv6 83
article thumbnail

Technology Short Take #84

Scott Lowe

Networking. Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). I wouldn’t take this information as gospel, but here’s a breakdown of some of the IPv6 support available in VMware NSX. Welcome to Technology Short Take #84! OK, bring on the links!

Windows 60
article thumbnail

Technology Short Take #84

Scott Lowe

Networking. Sjors Robroek describes his nested NSX-T lab that also includes some virtualized network equipment (virtualized Arista switches). I wouldn’t take this information as gospel, but here’s a breakdown of some of the IPv6 support available in VMware NSX. Welcome to Technology Short Take #84! OK, bring on the links!

Windows 60