How digital transformation can reveal network weaknesses
When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity.
When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity.
Stateless, Inc. launches its Luxon platform that enables provisioning of network functions as microservices.
The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence
Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs
Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging
The European Commission has approved the most stringent data privacy regulation anywhere and it is sure to impact businesses worldwide
Reducing the surface that needs to be protected to a single application, it's easier to apply very tight controls through Software Defined Perimeter techniques.
Software containers are the hottest technology in application development, but they lack inherent security and vulnerability management capabilities
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.
"Lions, and tigers and bears! Oh, my!" Anyone who has ever seen The Wizard of Oz knows that's the sum of the fears of Dorothy, Scarecrow and Tin Woodsman as they head into the woods on their way to Oz. For the network security administrator dealing with unmanaged devices, that refrain might be something like "handhelds, and laptops and guests! Oh, my!"
About fifteen years ago, my husband and his colleague had their laptop computers stolen out of a car. They were fearful of reporting the incident to their boss, largely because the laptops had cost the company about US$7,000 each. A $14,000 hit to the departmental budget was a serious blow. And back in those days, no one gave much thought to exposure of the data on the stolen devices.
Sometimes, the problems we experience with computers are a result of a legacy design. Hardware or software might have been architected 10 or 20 years ago when the world of computing was vastly different from the way it is today. As a result, the product in use today isn't as effective as it could be because of aging or obsolete design.