Extreme addresses networked-IoT security

Network World

Extreme Networks has taken the wraps off a new security application it says will use machine learning and artificial intelligence to help customers effectively monitor, detect and automatically remediate security issues with networked IoT devices.

Microsegmentation – Secure Your Internal Network

CTOvision

The problem I have with these statements is that every network engineer I know segments their network more than just at the subnet level and their segmentation is not limited to just north-south traffic. This is something you can’t do with static network ACLs at layer 2.

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Tempered Networks simplifies secure network connectivity and microsegmentation

Network World

The TCP/IP protocol is the foundation of the internet and pretty much every single network out there. There’s nothing in the protocol for security, mobility, or trusted authentication. This is one of the reasons networks are so complicated today.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Corelight: Powerful network visibility solution for security professionals

CTOvision

Company CTO Cyber Threat Intelligence Network Traffic and Analysis Security Companies CorelightCorelight was founded by the creators of the open-source Bro project.

How Is Network Security Complexity Holding You Back?

CTOvision

Read Brian Remmel explain how network security complexity can hamper the functioning of organizations on Cisco Blog : At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks.

Network Awareness Using ARPwatch | Roadmap to Securing Your Infrastructure

Linux Academy

This topic of network awareness is dear to my heart — not because of what it does but because it is network-based and I started out in the IT field as a network engineer, so networking holds a special place for me. What do I mean by “network awareness”?

How SD-Branch addresses today’s network security concerns

Network World

Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security.

WAN 86

How software-defined networking can secure critical systems

Computer Weekly

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

System 204

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

PaloAlto Networks partners with US Girl Scouts on security skills

Computer Weekly

Palo Alto Networks is partnering with the Girl Scouts of the USA to develop cyber security badges to foster knowledge of the topic and support interest in the profession

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.

Federal Cyber Security Best Practices Session with Rick Howard, CSO, Palo Alto Networks

CTOvision

Palo Alto Networks is sponsoring a Federal Cyber Security Best Practices session on Thursday, March 19, 2015, from 11:30 AM to 1:30 PM ET, with Rick Howard, Chief Security Officer for Palo Alto Networks. Join your Federal cyber security peers from the Washington D.C.

The Realities of Rural 5G Deployment in the US

Forrester IT

Early last week, Ajit Pai, the Chairman of the US Federal Communications Commission (FCC) announced his approval of the merger of T-Mobile and Sprint. This will result in a third mega-carrier in the US mobile wireless market, which is a good move for consumers like you and me.

BluVector: Revolutionizing network security with state-of-the-art AI

CTOvision

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world's most sophisticated threats in real time. The BluVector team brings deep experience, including work in sensitive national security missions for the US Intelligence Community.

Italian startup uses IoT network to improve bicycle security

Computer Weekly

Turin-based Sherlock, a bike security startup, is connecting its GPS anti-theft units to Orange Business Services’ worldwide IoT network

Security platforms to disrupt industry, predicts Palo Alto Networks

Computer Weekly

Collaborative security platforms will enable developers to focus on innovation and force the security industry to change business models, predicts Palo Alto Networks

Get ready for the convergence of IT and OT networking and security

Network World

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and security.

The Single Greatest Threat To A CIO’s Network Security: Their Children

The Accidental Successful CIO

As CIOs we understand the importance of information technology and so we go to great lengths to secure our corporate networks. Since most of us end up doing a great deal of our work from home, we also do our best to secure our home networks also.

FingBox Gives You Network Superpowers: Network security that contributes to physical security

CTOvision

Features of the FingBox help you track the status of your network and the many devices connected to it. Artificial Intelligence CTO Cyber Security Cyber War NewsFingBox is a fantastic device that I recommend everyone put in their home. It is also perfect for small businesses. It also enables you to set alerts and receive notifications when device status changes. You can […].

Security Innovation Network SINET 16 Application Process Now Open

CTOvision

We have previously written about the Security Innovation Network ( SINET ) and the yearly SINET Showcase. Established security firms should track SINET to learn of emerging capabilities to partner with. By Bob Gourley.

Cloud, AI and security driving network monitoring industry

Computer Weekly

We explore the latest developments and trends in enterprise network monitoring and management

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Data Center World Networking SecurityUpwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Napatech: Accelerating Network Management and Security Applications

CTOvision

Napatech is the world leader in accelerating network management and security applications. Communications Companies Company Hot Technologies Security Companies Copenhagen Napatech Network management PR Newswire Time to market They focus on keeping their customers one step ahead of the data growth curve by accelerating applications and time-to-market while reducing risk.

Tempered Networks simplifies network security

Network World

I don’t think anyone would disagree with the statement that IT security has become exponentially more complex over the past five years. It seems every month there’s a new startup that solves a specific security issue but addresses only that one issue. This leads to an increasing number of security vendors causing security solution sprawl. One startup trying to simplify security is Tempered Networks.

Lessons Learned: IT Infrastructure and Network Security

Data Center Knowledge

Major data breaches make it clear that data security is a serious problem, writes Patrick Quirk of Emerson Network Power. But despite the rash of breaches, there remains an industry-wide naïveté when it comes to these types of security concerns. Read More. Industry Perspectives

Getting grounded in IoT networking and security

Network World

Getting grounded in IoT networking and security. The internet of things already consists of nearly triple the number of devices as there are people in the world, and as more and more of these devices creep into enterprise networks it’s important to understand their requirements and how they differ from other IT gear. download.

Security Innovation Network Innovation Summit 17 July 2014 in NYC

CTOvision

We have written before about the Security Innovation Network ( SINET ). Supported by the US Department of Homeland Security Science & Technology Directorate. Director , National Security Agency. Chief , Central Security Service. Cyber Security DoD and IC Security Innovation Network Silicon Valley SINET By Bob Gourley.

Community around open-source network security monitor Bro meets at BroCon: 10-12 Oct 2018 Arlington VA

CTOvision

If you work in the network security world you most likely do. Bro is an open-source network security monitor. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. CTO Cyber Security Events NewsDo you know Bro? Bro has successfully bridged the traditional gap between academia and operations since its inception. […].

Palo Alto Networks confident of taking security into SaaS era

Computer Weekly

Security platforms could make it easier to take products to market and improve firms’ security posture by making innovative products easier to consume, but the biggest winners could be the platform providers

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

CIOs like to think of their antivirus software as providing them with a wall of defense between their corporate networks and the big scary outside world. All this leads to CIOs who are going through each day with a false sense of security.

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-­?Speed Networks

CTOvision

Are you a system engineer or administrator charged with protecting your network infrastructure from attack? Napatech''s Field Programmable Gate Arrays (FPGAs) can help you to improve on the ability to monitor and react to malicious events that occur within your network. scale networks.