Cisco: 75% of IoT initiatives not successful

By | May 24th, 2017|Blog|

In a study out from Cisco this week, one of the key vendors in IoT, says that only 26 percent of companies in their survey feel that they have been successful with their IoT initiatives. The danger zone for most IoT initiatives is the proof of concept (POC) stage, where 60 percent stall. The complexity of moving from [...]

Healthcare IT networks front line for cyberattacks

By | August 24th, 2016|Blog|

The month of August has seen a surge in cyberattacks on healthcare IT networks in the US using the Locky ransomware, a more highly evolved and effective version of the CryptXXX family of ransomware. Locky is so named because it locks down files and demands payment to free them and is distributed through social engineering methods. [...]

The continuing evolution of the CIO

By | May 23rd, 2016|Blog|

Much has been made of how the role of the CIO is changing from a cost center manager to a driver of technological change that can help the business succeed or hit it out of the park. The continued decentralization of IT, which some estimates now put at more than more than half of technology spending [...]

Cybersecurity threats in 2016

By | December 7th, 2015|Blog|

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Security automation parallels network automation

By | November 17th, 2015|Blog|

An increasing number of security tools are providing automation capabilities to reduce the burden on security specialists when it comes to intrusion prevention, network access control, endpoint security and mobile device management. But to a large degree, these features sit unused. Legitimate worries about blocking business traffic accidentally and keeping business from operating as it [...]

“Flavor of the day” network security

By | October 15th, 2015|Blog|

Network security is tough. Too often a new attack vector appears on the scene and vendors scramble to put out a product to counter it. Companies scramble to implement it. And the bad guys scramble to find a new attack vector and it all starts over again. After a few cycles, this can lead to [...]

FBI publishes examples of IoT risks

By | October 15th, 2015|Blog|

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

By | September 9th, 2015|Blog|

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]

Putting air bags in a 1965 Mustang?

By | June 22nd, 2015|Blog|

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]

Continuing concerns over industrial networks

By | April 10th, 2015|Uncategorized|

It's not a new topic, but SCADA and other industrial control networks continue to be integrated into IP networks and utilize old computing platforms (Windows XP) for management of the programmable logic controllers (PLCs) that actually control industrial equipment. There are a number of well-known espionage examples of PLCs being exploited with malware, like the [...]