Protecting against insider threats

By | April 17th, 2017|Blog|

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]

Maintaining audit and compliance reporting

By | March 13th, 2017|Blog|

I read an article recently that was titled, "You broke the network. Do you confess?" And it made me think about the audit and compliance reporting of the Uplogix platform, because it kind of takes the fun out of the question. The author of the original post on Reddit's /r/networking asked: "Have you ever accidentally [...]

User access a challenge to lock down

By | September 20th, 2016|Blog|

User access remains a pain for most companies according to a recent survey, with few IT managers reporting that they are satisfied with managing privileged-user access. The study by the Ponemon Institute with Forcepoint, showed that privileged users (defined as database admins, network engineers, IT security pros and cloud custodians) unsurprisingly have the most useful [...]

Greater cybersecurity for satellite & SCADA

By | September 9th, 2015|Blog|

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Locking down long-time vulnerabilities

By | February 11th, 2014|Uncategorized|

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

NIST cybersecurity framework development continues

By | November 18th, 2013|Uncategorized|

NIST, the National Institute of Standards and Technology, held its fifth public workshop last week in Raleigh, North Carolina on a comprehensive cybersecurity framework mandated in a February 2012 executive order. The framework is designed to improve cybersecurity across sixteen critical infrastructure industries and build up from a basic core of functions based around the [...]

DARPA Grand Challenge targets automated cyber security

By | October 28th, 2013|Uncategorized|

A view of some of the sensing hardware on an autonomously piloted vehicle in the DARPA Grand Challenge. DARPA (the Defense Advanced Research Projects Agency) announced the next focus area in their series of Grand Challenges that have included autonomously driven vehicles, humanoid robotics and now automated network defenses. The Cyber Grand Challenge seeks to [...]

Uplogix supports National Cyber Security Awareness Month

By | October 18th, 2013|Uncategorized|

Uplogix compliance reporting records who  has accessed devices and what was done. Both Uplogix and the National Cyber Security Awareness Month (NCSAM) are celebrating 10-year anniversaries in 2013, and share a relevance in today’s technology landscape that more important than ever. The month-long NCSAM event aims to raise awareness of cyber security issues to create [...]

Look in the mirror for the biggest security risk

By | June 6th, 2013|Uncategorized|

With just over 1 in 3 data breaches of a malicious nature,most of the time, the security risk is just human error. In the eighth installment of the annual Symantec Cost of a Data Breach report, the security firm concluded that mistakes made by employees lead to nearly two-thirds of data breaches. Surveying 277 companies [...]

Should you worry more about compliance or risk?

By | May 3rd, 2013|Uncategorized|

When is the right time to think about compliance versus risk? Network World interviewed the CIOs of Underwriters Laboratories and the Minnesota Department of Veteran Affairs on this topic and generated some interesting comments. Both make the expected argument that you can't pursue one over the other, but in the end they say risk is the [...]