FBI publishes examples of IoT risks

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]

Greater cybersecurity for satellite & SCADA

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Best buds? CIO/CFO collaboration

It's easy to find articles talking about how the role of the CIO is becoming more closely linked (in some cases consumed) by the CFO. The collaboration is generally attributed to the importance of IT in every aspect of corporate profitability. While the financial success of an enterprise requires cooperation across the entire C-suite, today [...]

Mid-year check of tech to watch

With June upon us, it's a good time to take a look at technologies to watch for the next-gen enterprise. Dion Hinchcliffe of ZDNet has a nice list of things business and IT leaders should be considering in their annual budgets. The challenge might not be what to spend money on, but how to get [...]

Breach report blames the usual suspects

The annual Verizon data breach investigations report came out this week with findings that show that the biggest threats are not new or unknown, but the same vulnerabilities that have plagued IT for years. It's been said that the only difference between a problem and a solution is that people understand the solution. Maybe not [...]

Does cybersecurity start in the corner office?

While the buck stops at the CEO's desk, are they really the ones who should be driving corporate cybersecurity? Today, since the damage caused by a cyber breach rivals that of a terrible business decision, it only makes sense that the c-suite should be fully invested in corporate cybersecurity. The only thing that's keeping pace [...]

Open vs. closed appliances in your network

When it comes to putting an appliance in your network for out-of-band management, you want to think carefully about whether that appliance is based on an open or closed platform. It might just be the difference between locking up network security and being open for business for hackers. A Linux platform lends itself to building [...]

Short security memory dooming IoT?

HP released a report expressing fears that the IT industry has a nasty habit of forgetting what they've learned security-wise each time it tackles the next big tech challenge. With the increasing excitement about the potential of the Internet of Things (IoT), hidden dangers are lurking. Daniel Miessler, the head of the research team at [...]

Better security through config management

Gartner says that the average firm makes 10,000 changes annually to its IT environment. It's no wonder change management can make or break your network. Literally. Security patches, interdependencies among various components of your network, and the ability to recover from a disaster are driving factors to companies attempting to create a Configuration Management Database [...]