Protecting against insider threats

By | April 17th, 2017|Blog|

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]

Maintaining audit and compliance reporting

By | March 13th, 2017|Blog|

I read an article recently that was titled, "You broke the network. Do you confess?" And it made me think about the audit and compliance reporting of the Uplogix platform, because it kind of takes the fun out of the question. The author of the original post on Reddit's /r/networking asked: "Have you ever accidentally [...]

Greater cybersecurity for satellite & SCADA

By | September 9th, 2015|Blog|

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Putting air bags in a 1965 Mustang?

By | June 22nd, 2015|Blog|

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]

Does cybersecurity start in the corner office?

By | March 24th, 2015|Uncategorized|

While the buck stops at the CEO's desk, are they really the ones who should be driving corporate cybersecurity? Today, since the damage caused by a cyber breach rivals that of a terrible business decision, it only makes sense that the c-suite should be fully invested in corporate cybersecurity. The only thing that's keeping pace [...]

Open vs. closed appliances in your network

By | March 23rd, 2015|Uncategorized|

When it comes to putting an appliance in your network for out-of-band management, you want to think carefully about whether that appliance is based on an open or closed platform. It might just be the difference between locking up network security and being open for business for hackers. A Linux platform lends itself to building [...]

Getting ready for the Internet of Things – Part 1

By | April 30th, 2014|Uncategorized|

Whether you call it the Internet of Things (IoT), the Internet of Everything, or just the next logical steps in networking, it's clear that if you aren't ready for it, the coming onslaught of IP-enabled devices is going to break your network. Maybe it will be the number of end nodes or the amount of [...]

How-To: Maintain visibility and accountability in outsourced IT

By | February 25th, 2014|Uncategorized|

The combination of a competitive managed services market and increasingly complicated enterprise network expectations have lead many companies to outsource their network management. Benefits that include lower cost of ownership, outside expertise and fewer inside demands must be balanced with less direct control and visibility. Or does it? A common complaint is that when problems [...]

Cisco, health care reports show no industry is safe

By | February 19th, 2014|Uncategorized|

Data breaches clearly aren't limited to retailers like Target. Cisco's annual security report predicts "unprecedented growth" for more and more advanced attacks coming in 2014. Mobile devices are clear targets, with about 99 percent of mobile malware affecting the Android platform. The behavior of mobile users tends to be less guarded, leaving devices with [...]

Cybersecurity Framework released in the calm before the storm

By | February 13th, 2014|Uncategorized|

A day before another winter storm shut down Washington DC with up to a foot of snow, the National Institute of Standards and Technology released the first version of a long-awaited cybersecurity framework. The report follows several recent cyber-attacks that compromised more than 100 million customer records from major retailers. The framework was billed in [...]