Microsegmentation – Secure Your Internal Network

CTOvision

The problem I have with these statements is that every network engineer I know segments their network more than just at the subnet level and their segmentation is not limited to just north-south traffic. This is something you can’t do with static network ACLs at layer 2.

Skyhigh Networks: CASB Security

CTOvision

Skyhigh is a leader in CASB, and are known for their focus on making cloud services safe for the enterprise while meeting security, compliance and government requirements. CASB Security CompaniesSkyhigh is now part of McAfee. Smart move there McAfee!

Corelight: Powerful network visibility solution for security professionals

CTOvision

Company CTO Cyber Threat Intelligence Network Traffic and Analysis Security Companies CorelightCorelight was founded by the creators of the open-source Bro project.

Strategies for Securing Nonprofit Networks

Doctor Chaos

Nonprofits often think about how to attract more volunteers or achieve a greater reach with their fundraising initiatives. However, getting targeted by cybercriminals is a possibility that may not come up for discussion.

FingBox Gives You Network Superpowers: Network security that contributes to physical security

CTOvision

Features of the FingBox help you track the status of your network and the many devices connected to it. Artificial Intelligence CTO Cyber Security Cyber War NewsFingBox is a fantastic device that I recommend everyone put in their home. It is also perfect for small businesses. It also enables you to set alerts and receive notifications when device status changes. You can […].

BluVector: Revolutionizing network security with state-of-the-art AI

CTOvision

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world's most sophisticated threats in real time. The BluVector team brings deep experience, including work in sensitive national security missions for the US Intelligence Community.

Security Innovation Network SINET 16 Application Process Now Open

CTOvision

We have previously written about the Security Innovation Network ( SINET ) and the yearly SINET Showcase. Established security firms should track SINET to learn of emerging capabilities to partner with. By Bob Gourley.

Napatech: Accelerating Network Management and Security Applications

CTOvision

Napatech is the world leader in accelerating network management and security applications. Communications Companies Company Hot Technologies Security Companies Copenhagen Napatech Network management PR Newswire Time to market They focus on keeping their customers one step ahead of the data growth curve by accelerating applications and time-to-market while reducing risk.

How software-defined networking can secure critical systems

Computer Weekly

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security

System 204

Community around open-source network security monitor Bro meets at BroCon: 10-12 Oct 2018 Arlington VA

CTOvision

If you work in the network security world you most likely do. Bro is an open-source network security monitor. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. CTO Cyber Security Events NewsDo you know Bro? Bro has successfully bridged the traditional gap between academia and operations since its inception. […].

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. The time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. Cyber Security Disruptive IT information technology National security

10 enterprise network mistakes that open the door to hackers

CTOvision

Taking certain common shortcuts when it comes to network and infrastructure security can leave your organization wide open to hackers, according to a Tuesday RSA 2019 session from Paula Januszkiewicz, CEO of CQURE. “Technology and security as we all know is not always about the techie stuff and solutions—it’s also about people,” Januszkiewicz said in the […]. Cyber Security News

How AI can improve network capacity planning

CTOvision

Network capacity planning aims to ensure that sufficient bandwidth is provisioned, allowing network SLA targets, such as delay, jitter, loss, and availability, to be reliably met. Until recently, the network data necessary for insightful capacity planning was generally only available via static, historical, after-the-fact reports. CTO Cyber Security News

Report: Network Complexity Creates Security Headaches

Data Center Knowledge

Complexity will hold two out of every five organizations back from making any upgrades to their networks in 2017, and security products are contributing to the problem, according to new research from Cato Networks. The Top Networking and Security Challenges in the Enterprise report, released on. Cloud Computing Infrastructure Security Shared

Report 168

PaloAlto Networks partners with US Girl Scouts on security skills

Computer Weekly

Palo Alto Networks is partnering with the Girl Scouts of the USA to develop cyber security badges to foster knowledge of the topic and support interest in the profession

Security Innovation Network Innovation Summit 17 July 2014 in NYC

CTOvision

We have written before about the Security Innovation Network ( SINET ). Supported by the US Department of Homeland Security Science & Technology Directorate. Director , National Security Agency. Chief , Central Security Service. Cyber Security DoD and IC Security Innovation Network Silicon Valley SINET By Bob Gourley.

Italian startup uses IoT network to improve bicycle security

Computer Weekly

Turin-based Sherlock, a bike security startup, is connecting its GPS anti-theft units to Orange Business Services’ worldwide IoT network

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-­?Speed Networks

CTOvision

Are you a system engineer or administrator charged with protecting your network infrastructure from attack? Napatech''s Field Programmable Gate Arrays (FPGAs) can help you to improve on the ability to monitor and react to malicious events that occur within your network. scale networks.

Security platforms to disrupt industry, predicts Palo Alto Networks

Computer Weekly

Collaborative security platforms will enable developers to focus on innovation and force the security industry to change business models, predicts Palo Alto Networks

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

CIOs like to think of their antivirus software as providing them with a wall of defense between their corporate networks and the big scary outside world. All this leads to CIOs who are going through each day with a false sense of security.

The Single Greatest Threat To A CIO’s Network Security: Their Children

The Accidental Successful CIO

As CIOs we understand the importance of information technology and so we go to great lengths to secure our corporate networks. Since most of us end up doing a great deal of our work from home, we also do our best to secure our home networks also.

Palo Alto Networks: A Next Generation Firewall

CTOvision

Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering.

Cloud, AI and security driving network monitoring industry

Computer Weekly

We explore the latest developments and trends in enterprise network monitoring and management

Tapping Global Threat Intelligence To Secure Enterprise Networks

CTOvision

On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. Discussions began with a question to the panel addressing the biggest threat to the United States’ national security.

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Data Center World Networking SecurityUpwards of 95 percent of breaches can be prevented by better managing existing technologies Read More.

Overview of the Security Innovation Network (SINET) Showcase 16 Innovators

CTOvision

We have previously written about the Security Innovation Network: SINET, the very virtuous organization focused on helping the creators, innovators and entrepreneurs of the security community. 2015 SINET 16 Innovators: Bayshore Networks, Inc. BehavioSec – Disruptive verification & authentication solutions that make consumers part of the security solution, rather than the problem. Data science for security data volume. Vectra Networks, Inc. –

NetworkToolbox- Network scanning and analyzing

CTOvision

Network Toolbox may be the best network app on in the Apple App Store. The Toolbox contains a suite of 32 tools that will help you analyze networks for configuration. It is also helpful in security or just general awareness of the networks you are on. Bob Gourley.

Video Presentation on Abusing Software Defined Networks

CTOvision

See the video at this link and embedded below: Im a huge fan of Software Defined Networking (SDN) and so many other related applications of advanced enterprise tech. CTO Cyber Security Video software defined networking

Video 194

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. This event helps highlight emerging technologies with potential dramatic positive impact on enterprise missions and also helps advance the exchange of ideas around mission needs and concepts of operation on enterprise cyber security. 7 hours Networking and Networking Reception.

Tempered Networks simplifies network security

Network World

I don’t think anyone would disagree with the statement that IT security has become exponentially more complex over the past five years. It seems every month there’s a new startup that solves a specific security issue but addresses only that one issue. This leads to an increasing number of security vendors causing security solution sprawl. One startup trying to simplify security is Tempered Networks.

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say.

Lessons Learned: IT Infrastructure and Network Security

Data Center Knowledge

Major data breaches make it clear that data security is a serious problem, writes Patrick Quirk of Emerson Network Power. But despite the rash of breaches, there remains an industry-wide naïveté when it comes to these types of security concerns. Read More. Industry Perspectives

National pen test execution standard would improve network security

Network World

People are worried about their companies’ networks and computer systems being hacked and data being stolen. Also read: What to consider when deploying a next-generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ]. Penetration tests involve live tests of computer networks, systems, or web applications to find potential vulnerabilities.

Identity Based Internet Protocol (IBIP): A network security innovation developed at The MITRE Corporation

CTOvision

Editor’s note: I’ve referenced before my participation on the board of Centripetal Networks , and their ability to deliver large scale commercial solutions of MITRE’s IBIP are an area I am particularly proud of. By Bob Gourley.