Nonpublic 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy

Forrester IT

Nonpublic 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.

Microsegmentation – Secure Your Internal Network

CTOvision

The problem I have with these statements is that every network engineer I know segments their network more than just at the subnet level and their segmentation is not limited to just north-south traffic. This is something you can’t do with static network ACLs at layer 2.

Extreme addresses networked-IoT security

Network World

Extreme Networks has taken the wraps off a new security application it says will use machine learning and artificial intelligence to help customers effectively monitor, detect and automatically remediate security issues with networked IoT devices.

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Why CISOs Need Cloud to Secure the Network

CEB IT

This type of connected employee, while a boon to the organization, can be a nightmare to the chief information security officer (CISO). Martha is not only exposing critical data to unknown networks while using WiFi services in public spaces, she is also exposing her company's network to possible threat exposures through external websites. Secure access service edge, or SASE, supports the need for dynamic secure access,” says Lawrence Orans , Vice President Analyst, Gartner.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Corelight: Powerful network visibility solution for security professionals

CTOvision

Company CTO Cyber Threat Intelligence Network Traffic and Analysis Security Companies CorelightCorelight was founded by the creators of the open-source Bro project.

Strategies for Securing Nonprofit Networks

Doctor Chaos

Nonprofits often think about how to attract more volunteers or achieve a greater reach with their fundraising initiatives. However, getting targeted by cybercriminals is a possibility that may not come up for discussion.

Top 5 IoT networking security mistakes

Network World

Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.

B2B 114

How to Keep Company IoT Networks Secure

CTOvision

Read Grayson Kemper explain how companies can keep the Internet of Things networks secure on IoT for All : As employees increase how often they use smart devices as part of their daily jobs, businesses are investing in building IoT networks. While IoT networks make information accessible and protected from hardware errors, businesses should invest in […].

How software-defined networking can secure critical systems

Computer Weekly

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

System 204

Network Awareness Using ARPwatch | Roadmap to Securing Your Infrastructure

Linux Academy

This topic of network awareness is dear to my heart — not because of what it does but because it is network-based and I started out in the IT field as a network engineer, so networking holds a special place for me. What do I mean by “network awareness”?

IoT security essentials: Physical, network, software

Network World

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology. And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

How Is Network Security Complexity Holding You Back?

CTOvision

Read Brian Remmel explain how network security complexity can hamper the functioning of organizations on Cisco Blog : At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks.

How SD-Branch addresses today’s network security concerns

Network World

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security.

WAN 113

PaloAlto Networks partners with US Girl Scouts on security skills

Computer Weekly

Palo Alto Networks is partnering with the Girl Scouts of the USA to develop cyber security badges to foster knowledge of the topic and support interest in the profession

Boeing's insecure networks threaten security and safety

Network World

Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M.

Boeing's unsecure networks threaten security and safety

Network World

Aircraft manufacturer Boeing's unsecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M.

Federal Cyber Security Best Practices Session with Rick Howard, CSO, Palo Alto Networks

CTOvision

Palo Alto Networks is sponsoring a Federal Cyber Security Best Practices session on Thursday, March 19, 2015, from 11:30 AM to 1:30 PM ET, with Rick Howard, Chief Security Officer for Palo Alto Networks. Join your Federal cyber security peers from the Washington D.C.

Fortinet CEO: Network and security technologies give rise to security-driven networking

Network World

The network and security industries both continue to evolve at a rate never seen before. Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals. However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business.

BluVector: Revolutionizing network security with state-of-the-art AI

CTOvision

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world's most sophisticated threats in real time. The BluVector team brings deep experience, including work in sensitive national security missions for the US Intelligence Community.

Italian startup uses IoT network to improve bicycle security

Computer Weekly

Turin-based Sherlock, a bike security startup, is connecting its GPS anti-theft units to Orange Business Services’ worldwide IoT network

Security platforms to disrupt industry, predicts Palo Alto Networks

Computer Weekly

Collaborative security platforms will enable developers to focus on innovation and force the security industry to change business models, predicts Palo Alto Networks

Security Innovation Network SINET 16 Application Process Now Open

CTOvision

We have previously written about the Security Innovation Network ( SINET ) and the yearly SINET Showcase. Established security firms should track SINET to learn of emerging capabilities to partner with. By Bob Gourley.

The Realities of Rural 5G Deployment in the US

Forrester IT

Early last week, Ajit Pai, the Chairman of the US Federal Communications Commission (FCC) announced his approval of the merger of T-Mobile and Sprint. This will result in a third mega-carrier in the US mobile wireless market, which is a good move for consumers like you and me.

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Data Center World Networking SecurityUpwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

Cloud, AI and security driving network monitoring industry

Computer Weekly

We explore the latest developments and trends in enterprise network monitoring and management

Napatech: Accelerating Network Management and Security Applications

CTOvision

Napatech is the world leader in accelerating network management and security applications. Communications Companies Company Hot Technologies Security Companies Copenhagen Napatech Network management PR Newswire Time to market They focus on keeping their customers one step ahead of the data growth curve by accelerating applications and time-to-market while reducing risk.

FingBox Gives You Network Superpowers: Network security that contributes to physical security

CTOvision

Features of the FingBox help you track the status of your network and the many devices connected to it. Artificial Intelligence CTO Cyber Security Cyber War NewsFingBox is a fantastic device that I recommend everyone put in their home. It is also perfect for small businesses. It also enables you to set alerts and receive notifications when device status changes. You can […].

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.

Tempered Networks simplifies network security

Network World

I don’t think anyone would disagree with the statement that IT security has become exponentially more complex over the past five years. It seems every month there’s a new startup that solves a specific security issue but addresses only that one issue. This leads to an increasing number of security vendors causing security solution sprawl. One startup trying to simplify security is Tempered Networks.

Lessons Learned: IT Infrastructure and Network Security

Data Center Knowledge

Major data breaches make it clear that data security is a serious problem, writes Patrick Quirk of Emerson Network Power. But despite the rash of breaches, there remains an industry-wide naïveté when it comes to these types of security concerns. Read More. Industry Perspectives

Getting grounded in IoT networking and security

Network World

Getting grounded in IoT networking and security. The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear. download.

Get ready for the convergence of IT and OT networking and security

Network World

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and security.