• Why the internet of energy requires service assurance

    Feb 23, 2018, 08:57 AM by Ben Gane
    Keeping the lights on might sound straightforward, but for energy providers, limiting outages and ensuring a high-quality customer experience is now intertwined with the cloud; software-defined data centers; blockchain and industrial Internet of Things (IoT). As these technologies and accelerators...
    Full story
  • Securing IoT Networks

    Feb 23, 2018, 08:35 AM by Ben Gane
    Q: How do you segment a mesh? A: You can’t. Legacy IoT devices, Industrial Control Systems with custom networking, are exceptionally difficult to secure. Typically, these devices contain only enough compute capabilities to support their primary...
    Full story
  • Why NY State Financial Firms Should Consider a New Regulation the Floor, Not the Ceiling

    Feb 22, 2018, 09:02 AM by Ben Gane
    As major milestone dates imposed by the pioneering and prescriptive New York State Department of Financial Services Cybersecurity Regulation (PDF) kick in on its first anniversary, now is an opportune time to consider the impact they will have on your financial services organization. Financial services...
    Full story
  • Intelligent Automation is needed for DDoS defence

    Feb 22, 2018, 08:57 AM by Ben Gane
    Distributed Denial of Service attacks (DDoS) are among the most widely utilized attack type targeting service provider and enterprise organizations. As a result, these organizations are increasingly challenged to handle the volume and diversity of attacks. The 13th annual Worldwide Infrastructure...
    Full story
  • File Director 4.5: What You Need to Know

    Feb 22, 2018, 08:54 AM by Ben Gane
    As more organizations look to harness the possibilities of cloud storage to decrease datacenter costs and raise efficiency, providers such as Microsoft are using the offer of 1TB of storage for every Office 365 business user to encourage use of their service. Let’s face it this is a great offer, but it has...
    Full story
  • Over 50% of young Brits reuse password for multiple online accounts

    Feb 22, 2018, 08:52 AM by Ben Gane
    Hackers targeting young Britons might find it easier than they think. According to the most recent UK government Cyber Awareness Campaign, over half of British citizens between 18 and 25 reuse a password for multiple accounts, including social media and online shopping networks. Some...
    Full story
  • Facebook aims to outsmart future high-tech election meddlers with 1861 technology

    Feb 21, 2018, 08:53 AM by Ben Gane
    To prevent high-tech meddling in US national elections of the future, Facebook plans to use a technology dating back to 1861 – the humble postcard. The social media giant plans to use the cards, first patented in 1861 in Philadelphia, as a form of two-factor authentication to confirm that political...
    Full story
  • Securing Our Connected Car Future with Panasonic

    Feb 21, 2018, 08:42 AM by Ben Gane
    There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert...
    Full story
  • Russian hackers sentenced to prison in US for compromising 160 million credit cards

    Feb 20, 2018, 09:02 AM by Ben Gane
    Two Muscovites have been sentenced to years in prison for their roles in the biggest data breach conspiracy ever prosecuted in the United States. Three co-conspirators are still at large. Vladimir Drinkman, 37 and Dmitriy Smilianets, 34, had previously pleaded guilty for their roles in the...
    Full story
  • Using SpamTitan spam filtering with Microsoft Office 365 – the perfect fit!

    Feb 19, 2018, 11:27 AM by Ben Gane
    Office 365 in the cloud has some great advantages. Microsoft manages the software updates,making it easier for the IT support services. You can collaborate in real time using different mobile devices and PCs. According to Adalloms annual Cloud Usage Risk Report...
    Full story
  • Russian nuclear weapons engineers detained after using facility’s supercomputer to mine cryptocurrency

    Feb 19, 2018, 09:30 AM by Ben Gane
    Reminiscent of the California Gold Rush, the cryptocurrency phenomenon has captured the minds of virtually everyone who understands digital currency. And those with the means to ‘mine’ it will go to great lengths to do so, as evidenced most recently by engineers at a nuclear weapons plant in...
    Full story
  • NotPetya/GoldenEye back in the spotlight: UK officially points finger to Kremlin for June 2017 cyberattack

    Feb 16, 2018, 09:04 AM by Ben Gane
    2017 has already gone down as the worst year on record from a cybersecurity standpoint. But the world is still not over the two infamous attacks deployed by hackers in May (WannaCry) and June (NotPetya/Goldeneye) of last year, which together dealt billions of dollars’ worth of damages to...
    Full story
  • Ivanti Customers Played ‘Would You Rather’ and The Results Are Hilarious

    Feb 16, 2018, 08:57 AM by Ben Gane
    It’s been a long winter, but we’re getting through it together. Between mermaid-shaped Snuggies, Disney Monopoly, and Netflix and chilling, we’re making the most of being indoors. And as a special bonus for 2018, we have the Winter Olympics...
    Full story
  • DNS Filter versus Firewall in a guest Wi-Fi environment

    Feb 15, 2018, 09:12 AM by Ben Gane
    In a recent Spiceworks community poll, 48% of IT professionals listed their perimeter firewall/UTM appliance as their chosen web filter solution for their respective guest Wi-Fi environments. Another 11% depended on their wireless management controller or software for filtering.This leaves only 41%...
    Full story
  • Winter Olympics ceremony allegedly hacked by Russia; no comment from IOC

    Feb 15, 2018, 09:04 AM by Ben Gane
    Hackers attacked the opening ceremony of the Pyeongchang Winter Olympics in South Korea, organizers confirmed. The attacks were allegedly carried out by Russia following a doping ban, but the organizers made no comments, writes the Guardian. Soon after the event started on Friday...
    Full story
  • How to manage self-service provisioning with virtual network functions in your SD-Wan service

    Feb 15, 2018, 08:55 AM by Ben Gane
    Is self-service ubiquitous? Tell that to the state government of New Jersey, where pumping your gas is still against the law. But elsewhere, yes, self-service is one of the cornerstones of digital transformation. According to the National Institute of Standards and Technology (NIST), one of the...
    Full story
  • Protect your Privacy with Bitdefender VPN

    Feb 14, 2018, 10:55 AM by Ben Gane
    A Virtual Private Network – also known as a VPN – is a group of computers linked together over the internet. This basically allows someone who’s connected to the internet, from anywhere in the world, to access a network that’s otherwise restricted and not accessible to everyone with a simple internet...
    Full story
  • February Patch Tuesday 2018

    Feb 14, 2018, 10:03 AM by Ben Gane
    Microsoft has released a pretty typical lineup this month. All the Operating System updates, Internet Explorer, Flash for IE, Edge, Office, and SharePoint are accounted for in February. There are a total of 50 unique vulnerabilities being resolved by Microsoft this month with one public disclosure...
    Full story
  • Set your GDPR countdown clock this valentine's day

    Feb 14, 2018, 08:37 AM by Ben Gane
    Valentine’s Day marks 100 days until the EU GDPR comes into enforcement – news that is likely to set some people’s hearts racing…and not in a good way! But May 25, 2018, is a date we all need to keep close to our hearts...
    Full story
  • The User: Always Your Weakest Link

    Feb 13, 2018, 08:55 AM by Ben Gane
    The Verizon Data Breach Investigations Report (DBIR) is one of the most respected annual reports in the security industry.Every year, the Verizon Research, Investigations, Solutions and Knowledge (RISK) team, one of the largest IT investigative entities in the world, shares deep insights into the...
    Full story
to Top