Assume that you are a Target

By | February 12th, 2014|Uncategorized|

There has been a buzz in the Uplogix office about the much-publicized Target credit card information breach. No, not just because many of us are now carrying shiny new credit cards proactively replaced by our banks due to our vulnerability as frequent Targét (say it Tar-zhay) shoppers, but because initial reports indicated that the breach relied [...]

Locking down long-time vulnerabilities

By | February 11th, 2014|Uncategorized|

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

M2M Management Case Study: ATMs

By | December 13th, 2013|Uncategorized|

Increasingly, automated teller machines are the “brick and mortar” point of contact for customers with their bank. For decades, these M2M systems have been popular with customers and increasingly reliable as the technology has advanced, but also complicated and expensive to support. One Uplogix customer has an aggressive plan to deploy ATMs and chose to [...]

Amazon’s PrimeAir faces the automation checklist

By | December 4th, 2013|Uncategorized|

In a 60 Minutes interview that relatively few people actually saw, but many are now reading about, Amazon founder Jeff Bezos showed off a couple of Amazon delivery drones. The idea is that at some point in the future, one of these eight-rotor robots would fly a <5 lb. Amazon purchase to you in 30 [...]

NIST cybersecurity framework development continues

By | November 18th, 2013|Uncategorized|

NIST, the National Institute of Standards and Technology, held its fifth public workshop last week in Raleigh, North Carolina on a comprehensive cybersecurity framework mandated in a February 2012 executive order. The framework is designed to improve cybersecurity across sixteen critical infrastructure industries and build up from a basic core of functions based around the [...]

Uplogix supports National Cyber Security Awareness Month

By | October 18th, 2013|Uncategorized|

Uplogix compliance reporting records who  has accessed devices and what was done. Both Uplogix and the National Cyber Security Awareness Month (NCSAM) are celebrating 10-year anniversaries in 2013, and share a relevance in today’s technology landscape that more important than ever. The month-long NCSAM event aims to raise awareness of cyber security issues to create [...]

Next-Generation Firewalls Benefit from Local Management

By | September 20th, 2013|Uncategorized|

Secure your firewall by taking its management interface out of the network path and more with Uplogix Lots of firewall news this week. First, HP announced its Next-Generation Firewall line, joining Palo Alto Networks, Cisco and Check Point in the evolving world of firewalls that blend traditional port-based controls with application controls and intrusion prevention. [...]

Local Management required for M2M device networking critical to smart grid

By | August 22nd, 2013|Uncategorized|

A recent report by Greentech Media puts the global smart grid market at $400 billion by 2020. The success of this market depends on strong networks connecting aggregation points for M2M devices in the field to data and operation centers. The large number and distributed nature of these networks will require secure automation like Uplogix [...]

Look in the mirror for the biggest security risk

By | June 6th, 2013|Uncategorized|

With just over 1 in 3 data breaches of a malicious nature,most of the time, the security risk is just human error. In the eighth installment of the annual Symantec Cost of a Data Breach report, the security firm concluded that mistakes made by employees lead to nearly two-thirds of data breaches. Surveying 277 companies [...]

Should you worry more about compliance or risk?

By | May 3rd, 2013|Uncategorized|

When is the right time to think about compliance versus risk? Network World interviewed the CIOs of Underwriters Laboratories and the Minnesota Department of Veteran Affairs on this topic and generated some interesting comments. Both make the expected argument that you can't pursue one over the other, but in the end they say risk is the [...]