Automation & AI don’t make talent obsolete

[fsn_row][fsn_column width="12"][fsn_text] The same (unfounded) concern we've heard for years from network admins that the automation functionality in Uplogix is going to take their job is being applied to AI in the workplace. It can't be further from the truth -- both technologies enable skilled admins to spend less time on routine tasks and augment [...]

Separation of duties isn’t just for accounting

The finance and accounting departments know all about separation of duties (SoD) -- the person who writes the checks isn't the same as the person who approves the checks. For the IT department, SoD is a little newer, but no less important. When regulations such as Sarbanes-Oxley (SOX) and the Gramm-Leach-Billey Act (GLBA) were enacted, [...]

Struts vulnerability in Equifax breach already patched in Uplogix

This week's giant data breach story was Equifax, the credit score reporting agency hadn't patched an Apache Struts vulnerability putting personal information on 143 million consumers at risk. The bad news? Odds are your data is included in the breach. The good news? If you are an Uplogix user, this vulnerability was already patched. Uplogix [...]

Protecting against insider threats

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]

Maintaining audit and compliance reporting

I read an article recently that was titled, "You broke the network. Do you confess?" And it made me think about the audit and compliance reporting of the Uplogix platform, because it kind of takes the fun out of the question. The author of the original post on Reddit's /r/networking asked: "Have you ever accidentally [...]

User access a challenge to lock down

User access remains a pain for most companies according to a recent survey, with few IT managers reporting that they are satisfied with managing privileged-user access. The study by the Ponemon Institute with Forcepoint, showed that privileged users (defined as database admins, network engineers, IT security pros and cloud custodians) unsurprisingly have the most useful [...]

Greater cybersecurity for satellite & SCADA

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Locking down long-time vulnerabilities

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

NIST cybersecurity framework development continues

NIST, the National Institute of Standards and Technology, held its fifth public workshop last week in Raleigh, North Carolina on a comprehensive cybersecurity framework mandated in a February 2012 executive order. The framework is designed to improve cybersecurity across sixteen critical infrastructure industries and build up from a basic core of functions based around the [...]

DARPA Grand Challenge targets automated cyber security

A view of some of the sensing hardware on an autonomously piloted vehicle in the DARPA Grand Challenge. DARPA (the Defense Advanced Research Projects Agency) announced the next focus area in their series of Grand Challenges that have included autonomously driven vehicles, humanoid robotics and now automated network defenses. The Cyber Grand Challenge seeks to [...]