Security is a complicated thing to deal with in the modern world. What we need now more than anything is education about what we face. Tom Hollingsworth takes a look at some of the things that impact our secure world and an upcoming event that can shed some light on how to face those challenges.
Security has a huge impact on your WAN strategy. This becomes even more apparent when you move to an SD-WAN architecture. Jed Casey takes a look at some of the things you need to consider when looking at SD-WAN security.
Germany has published a draft outline security rules for SOHO routers. We dig into some of the peculiarities of the rules, and what might have been left out.
Edge computing and IoT are hot topics in today’s market. But not all edge computing solutions are built for the future. Tom Hollingsworth takes a look at a new startup, Edgeworx, and what they’re doing to make a big splash at the edge.
Tom Hollingsworth takes a look at the growing world of microsegmentation and how smaller companies like Guardicore are jumping at the chance to work with users to secure their applications and systems and ensure that traffic is only going where it is supposed to go.
Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
As a long time Have I Been Pwned fan, I like to keep up with what Troy Hunt is saying about security. In this post, he makes the argument that publicly shaming bad corporate security is a net positive. This kind of direct public pressure, either from journalists, security researchers, or anyone with social reach, […]
With Cisco Live US happening this week in Orlando, we decided to share a throwback episode featuring Rob Rodgers and Mils Swart of Skyport Systems. Skyport was recently acquired by Cisco in February. It’ll be interesting to see how Cisco uses this talent to address the security concerns raised in this episode.
Managing access control lists on firewalls is a time consuming affair that often leads to significant frustration. There needs to be an easy way of making sure that these constructs are successfully maintained. Tom Hollingsworth looks at a new SolarWinds tool from Tech Field Day 16 and how Network Insight for Cisco ASA has features to help you control your access lists.
Gmail doesn’t distinguish if you put extra dots in your email. Netflix does. Oh, not a problem you say? Bruce Schneier shows how two mundane data practices can come together to create a security exploit.