Can SD-WAN innovate through software alone? Or can custom hardware ASICs make the difference in performance? Tom Hollingsworth takes a look at the Fortinet presentation from Networking Field Day and discusses how ASICs may be the key to Foritinet finding their ante in the SD-WAN market.
How can you protect your virtual workloads in the cloud? Or your east/west traffic flows between hosts behind a perimeter firewall? Tom Hollingsworth talked to ShieldX about how they’re able to microsegement the traffic flows between your virtual workloads.
RSA 2019 is coming up fast! Tom Hollingsworth takes a quick look at why RSA is so important as well as understanding some of the areas of security that are in focus this year and who you should be talking to in order to learn more about them.
It’s become a media narrative that there is a “talent gap” in cybersecurity. The story goes that there are plenty of good paying jobs, but not enough qualified people to do them. On the face of it, there seem to be good reasons. The spate of high profile data leaks and hacks have made security a front and center concern for organizations of all sizes. As the sophistication of these attacks increase, it makes sense that the number of jobs needed would also increases. But Ben Tomhave can’t stand this narrative. He makes the case that this talent gap is actually symptomatic of organizational dysfunction.
The current US government shutdown is a political problem, but one that has real world security implications. We touched on this during the Gestalt IT Rundown last week, but Brian Krebs has an in-depth breakdown of is actually happening behind the scenes.
Managing infrastructure is hard enough. But in today’s world of cloud computing it can be tough to manage constructs that live for seconds instead of persisting. How can you keep a handle on it all. Confidentially, the best way is with Aporeto. Tom Hollingsworth discusses the power of identity management for workloads in this post.
Two-factor authentication is a simple security measure, right? What if you could take that and build on it to the point where it becomes a huge piece of your overall security posture? Tom Hollingsworth takes a look at Cisco’s recent Duo acquisition and how it can be leveraged for more than just a few factors.
Data protection can mean making sure you have adequate copies to ensure integrity and uptime. But after Australia passed the Telecommunications Access and Assistance Bill, requiring encryption backdoors, Preston de Guise wonders if it’s possible maintain the privacy function of data protection.
According to a recent audit, the Army, Navy, and Missile Defense Agency are having some issues with basic security. How bad is it? [I]nvestigators found that many users did not enable multifactor authentication for their accounts Ok, that’s not great. [T]he network was never configured to support multifactor authentication at all. Gulp Investigators found that […]
Cheap, tiny, and full-featured SoCs are great tools for exploring creativity. But those same features also make them great tools to malicious actors. The recent DarkVishnya attacks in Eastern Europe saw them used to gain local access to banking information.