article thumbnail

Does your cloud-access security broker support IPv6? It should.

Network World

Cloud access security brokers ( CASB ) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. That’s because CASBs might not support IPv6, which could be in wide corporate use even in enterprises that choose IPv4 as their preferred protocol.

IPv6 135
article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. Mobile and Internet of Things (IoT) are driving most of the growth, according to Halachmi.

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Note that some of these attacks are also common to IPv4 and are not necessarily unique to IPv6. In such cases, every mobile device has its own /64 subnet.

IPv6 60
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. Fast Orientation, Inc.

Company 258
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

Avoid charging mobile devices through a computer; instead, use separate adapters. This may include computers, laptops, printers, mobile phones, tablets, CCTV cameras, household appliances, cars, baby monitors, smart home devices, video streaming tools, game consoles, etc. Use the 3-2-1 backup rule. Fully utilize firewall capabilities.

Network 83
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

A good way to think about DNS is to look at the contacts application on your mobile phone. In DNS, this is known as an "A" record and is one of many different record types including, but not limited to AAAA (IPv6), MX (mail), NS (nameserver), and TXT (text). DNS works like a contact application for the Internet.

Research 150
article thumbnail

A Tutorial For Enhancing Your Home DNS Protection

CTOvision

You will change the DNS entries on your home router, and you will also change the DNS settings on your mobile devices and computers. For mobile devices, look under your Wi-Fi settings and update the DNS entries there. Click either IPV4 or IPv6 and click properties. It is all quite easy. and 64.6.65.6).

Fashion 177