Protecting against insider threats

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]

Maintaining audit and compliance reporting

I read an article recently that was titled, "You broke the network. Do you confess?" And it made me think about the audit and compliance reporting of the Uplogix platform, because it kind of takes the fun out of the question. The author of the original post on Reddit's /r/networking asked: "Have you ever accidentally [...]

IoT business justifications (+ a scary anecdote)

The Internet of Things (IoT) has never been short on hype or fear, but as real applications and deployments begin to factor into tactical business plans, calculating total cost of ownership (TCO) and return on investment (ROI) is required. Starting with costs, consider current environmental costs and implementation costs. The current environment includes what you are [...]

Satellite cybersecurity ramps up

Satellite operators have long felt just a little safer than most when it came to security. But today, satellite cybersecurity is standard operating procedure. No longer does an unobstructed beam bouncing off a satellite or remote locations guarantee security. Every day more of the world's critical infrastructure for communications, defense, financial, environmental monitoring, shipping and logistics -- [...]

2017 predictions for IT networking & security

Mid-way through the last month of the year means it's time for everyone to release their predictions for IT in the coming year. This year is no different, and given recent headlines about Russian hacking and ransomware designed to let you opt to infect others you know rather than pay up, we're going to talk [...]

Network recovery after the hack

Today we live in a world of "when." And when you're affected by a security breach, you need to think beyond just data protection and backup. You need a clear plan for network recovery after the hack that doesn't rely on the network itself or slow trips to remote sites for "sneaker net" repairs. This [...]

IT horror stories and infographics

This is the time of year when everyone shares their horror stories. That's right, Cybersecurity Awareness Month!  IT is no different and never at a loss for some one-upmanship when the topic comes up. From holey firewalls to leaky plumbing in the ceiling above a data center, not to mention the terrors of the IoT, there are enough [...]

User access a challenge to lock down

User access remains a pain for most companies according to a recent survey, with few IT managers reporting that they are satisfied with managing privileged-user access. The study by the Ponemon Institute with Forcepoint, showed that privileged users (defined as database admins, network engineers, IT security pros and cloud custodians) unsurprisingly have the most useful [...]

Critical infrastructure cybersecurity gains new awareness

It's a common refrain that when it comes to critical infrastructure cybersecurity, it's not a matter of if; it's a matter of when. Cyberattacks around the world have shown the potential dangers of such an attack. Industrial control systems (ICS) are increasingly under attack, with the number of reported incidents in the US alone up 17 percent [...]

Cybersecurity election year challenges

Cybersecurity is much more than just part of a stump speech in this election year. Between reports of multiple Russian groups hacking into the Democratic Party and preparations underway to lock down IT at the Republican national convention, cybersecurity is front page news. This spring, the Democratic National Committee's network was breached by at least two [...]