article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. All of these messages derive from the assumption that one subnet = one security zone, and therefore intra-subnet communications are not secured.

IPv6 60
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

However, many end-users do not recognize their home networks as extensions of their company's security boundaries. They often feel that using a company-provided laptop linked to the corporate security system is sufficient. As a result, they might not take enough measures to secure their other home devices.

Network 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 146

Scott Lowe

There’s some networking stuff, a few security links, and even a hardware-related article. Denise Fishburne has a 7-part series on IPv6. Servers/Hardware. Jimmy Mankowitz talks in some detail about using NSX-T in vSphere with Tanzu to secure applications. Networking. ” Who will be correct?

IPv6 97
article thumbnail

Technology Short Take 146

Scott Lowe

There’s some networking stuff, a few security links, and even a hardware-related article. Denise Fishburne has a 7-part series on IPv6. Servers/Hardware. Jimmy Mankowitz talks in some detail about using NSX-T in vSphere with Tanzu to secure applications. Networking. ” Who will be correct?

IPv6 60
article thumbnail

Technology Short Take 153

Scott Lowe

This article contains some good information on IPv6 for those who are just starting to get more familiar with it, although toward the end it turns into a bit of an advertisement. Servers/Hardware. Cabling is hardware, right? I hope you’re able to find something useful here! Networking. Cloud Computing/Cloud Management.

Linux 74
article thumbnail

DDoS: Understand The Growing Threat From Botnet #14

CTOvision

If IoT devices supporting IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) are introduced, the potential for larger DDoS attacks compounds. If the cost of nanoscale sensors drop to a price point that essentially make them disposable, IoT vendors will likely skimp on the security assuming that they will become garbage.

Internet 150
article thumbnail

What Can You Get from an IP Address and Why is it Important?

Galido

For those who are scratching their heads, a good example of hardware that uses a data link layer is an ethernet cable. Here’s how to tell apart the following IP addresses: IPv4 and IPv6. When it comes to IPv4 and IPv6 addresses, these are mainly used to find your location and identify who you are. Dynamic and static.

IPv6 105