Open vs. closed appliances in your network

When it comes to putting an appliance in your network for out-of-band management, you want to think carefully about whether that appliance is based on an open or closed platform. It might just be the difference between locking up network security and being open for business for hackers. A Linux platform lends itself to building [...]

Getting ready for the Internet of Things – Part 1

Whether you call it the Internet of Things (IoT), the Internet of Everything, or just the next logical steps in networking, it's clear that if you aren't ready for it, the coming onslaught of IP-enabled devices is going to break your network. Maybe it will be the number of end nodes or the amount of [...]

Cybersecurity Framework released in the calm before the storm

A day before another winter storm shut down Washington DC with up to a foot of snow, the National Institute of Standards and Technology released the first version of a long-awaited cybersecurity framework. The report follows several recent cyber-attacks that compromised more than 100 million customer records from major retailers. The framework was billed in [...]

Assume that you are a Target

There has been a buzz in the Uplogix office about the much-publicized Target credit card information breach. No, not just because many of us are now carrying shiny new credit cards proactively replaced by our banks due to our vulnerability as frequent Targét (say it Tar-zhay) shoppers, but because initial reports indicated that the breach relied [...]

Locking down long-time vulnerabilities

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

NIST cybersecurity framework development continues

NIST, the National Institute of Standards and Technology, held its fifth public workshop last week in Raleigh, North Carolina on a comprehensive cybersecurity framework mandated in a February 2012 executive order. The framework is designed to improve cybersecurity across sixteen critical infrastructure industries and build up from a basic core of functions based around the [...]

DARPA Grand Challenge targets automated cyber security

A view of some of the sensing hardware on an autonomously piloted vehicle in the DARPA Grand Challenge. DARPA (the Defense Advanced Research Projects Agency) announced the next focus area in their series of Grand Challenges that have included autonomously driven vehicles, humanoid robotics and now automated network defenses. The Cyber Grand Challenge seeks to [...]

Look in the mirror for the biggest security risk

With just over 1 in 3 data breaches of a malicious nature,most of the time, the security risk is just human error. In the eighth installment of the annual Symantec Cost of a Data Breach report, the security firm concluded that mistakes made by employees lead to nearly two-thirds of data breaches. Surveying 277 companies [...]

Should you worry more about compliance or risk?

When is the right time to think about compliance versus risk? Network World interviewed the CIOs of Underwriters Laboratories and the Minnesota Department of Veteran Affairs on this topic and generated some interesting comments. Both make the expected argument that you can't pursue one over the other, but in the end they say risk is the [...]

Keeping tabs on your network

A couple of scenarios commonly tested by potential Uplogix customers are built around cyber security features of Local Management. Uplogix enhances enterprise security by extending role based administrative access policies to network devices and by providing detailed auditing and reporting in support of attaining and demonstrating regulatory compliance. Importantly, all of these capabilities are maintained [...]