Network World

Geeky ways to celebrate Friday the 13th

Network World - Thu, 07/12/2018 - 11:14am
You're in luck

We've cobbled together a slew of things for the geeky among you to do on July 13 -- Friday the 13th that is. And we suggest you do it up because you won’t get another chance until Sept. 13, 2019.

Don’t miss the day!

Mobile apps exist solely for the purpose of reminding you when Friday the 13th is coming up. Pocketkai’s free iOS app will remind you of the one to three Friday the 13ths coming up each year for the next 50 years. The Bogeyman’s Android app will do likewise, for the next 10 Friday the 13ths.

To read this article in full, please click here

Categories: Network World

What are the options for securing SD-WAN?

Network World - Thu, 07/12/2018 - 6:00am

A key component of SD-WAN is its ability to secure unreliable Internet links and identify anomalous traffic flows.

SD-WAN technology providers are continuing to increase their native security features and to create robust ecosystems of network-security partners.

[ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ]

IT managers should consider their branch network security requirements and carefully evaluate the security capabilities of leading SD-WAN providers, include their native security features and their partnerships with network security providers.

To read this article in full, please click here

(Insider Story)
Categories: Network World

The aftermath of the Gentoo GitHub hack

Network World - Tue, 07/10/2018 - 10:23am
Gentoo GitHub hack: What happened?

Late last month (June 28), the Gentoo GitHub repository was attacked after someone gained control of an admin account. All access to the repositories was soon removed from Gentoo developers. Repository and page content were altered. But within 10 minutes of the attacker gaining access, someone noticed something was going on, 7 minutes later a report was sent, and within 70 minutes the attack was over. Legitimate Gentoo developers were shut out for 5 days while the dust settled and repairs and analysis were completed.

The attackers also attempted to add "rm -rf" commands to some repositories to cause user data to be recursively removed. As it turns out, this code was unlikely to be run because of technical precautions that were in place, but this wouldn't have been obvious to the attacker.

To read this article in full, please click here

Categories: Network World

While no one was looking, California passed its own GDPR

Network World - Thu, 07/05/2018 - 9:23am

The European Union’s General Data Protection Regulation (GDPR) is widely viewed as a massively expensive and burdensome privacy regulation that can be a major headache and pitfall for American firms doing business in Europe. Many firms, including Facebook, have sought ways around the law to avoid having to deal with the burden of compliance.

Well, there is no weaseling out now. Last week, with no fanfare, California Governor Jerry Brown signed into law AB375, the California Consumer Privacy Act of 2018, the California equivalent of GDPR that mirrors the EU law in many ways.

To read this article in full, please click here

Categories: Network World

Pulse Secure VPN enhanced to better support hybrid IT environments

Network World - Tue, 07/03/2018 - 9:40am

The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.

This is the playing field for Pulse Secure, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises — maybe even yours.

To read this article in full, please click here

Categories: Network World

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

Network World - Tue, 07/03/2018 - 7:00am
In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.
Categories: Network World

Strange and scary IoT hacks

Network World - Tue, 07/03/2018 - 6:00am
Here's the Thing …

Image by Ivanastar / Getty Images

To read this article in full, please click here

Categories: Network World

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Network World - Tue, 06/19/2018 - 6:00am
Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.
Categories: Network World

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Network World - Mon, 06/18/2018 - 6:00am

With Windows Server 2019, Microsoft is adding resiliency and redundancy enhancements to the Shielded Virtual Machines security controls it introduced with Windows Server 2016.

Shielded VMs originally provided a way to protect virtual machine assets by isolating them from the hypervisor infrastructure and could also help prove to auditors that systems were adequately isolated and controlled. Now Shielded VM enhancements in Window Server 2019 provide real-time failback configurations and host- and policy-based security improvements.

[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ] Host key attestation

Under Windows Server 2016, key authentication was based on trusted platform module (TPM) cryptoprocessors and Microsoft Active Directory authentication.  Both of these are great solutions but were limited when it comes to extensibility and redundancy.

To read this article in full, please click here

(Insider Story)
Categories: Network World