Spectre, Meltdown exploits don’t impact Uplogix

By | January 11th, 2018|Blog|

The New Year kicked off with a thud as the Meltdown and Spectre exploits dominated headlines with critical vulnerabilities in modern processors. Uplogix Local Managers are not impacted by these exploits. IN BRIEF The Uplogix 5000 and 500 Local Managers are not impacted by either the Meltdown or Spectre exploits. Hardware components in both Local Manager [...]

KRACK zero-day cracks WPA2

By | October 19th, 2017|Blog|

This week began with the zero-day news for a bug that effectively broke WPA2 wireless security. KRACK, named for Key Reinstallation Attack, is a fundamental flaw in the operation of Wi-Fi Protected Access II, the security protocol upgrade from the old, broken WEP protocol. The issue is with the systems four-way handshake that permits [...]

Ransomware brings down county services

By | September 20th, 2017|Blog|

Montgomery County in Alabama was hit by a ransomware attack that left IT staff scrambling to regain control of their systems. Among other impacts, vehicle tags and registrations are unable to be processed as officials investigate the cause of the breach and their options to regain control and clean up their system. The debilitating ransomware [...]

Maritime networks concerned following breach

By | August 11th, 2017|Blog|

Maritime networks are getting even more serious about security following the high-profile cyber attack of shipping giant Maersk in June. The coordinated attack impacted business on a global scale as Maersk had to take IT systems offline to respond to the breach over the span of about a week. It's not the first time maritime [...]

Security reading for May the Fourth

By | May 4th, 2017|Blog|

If you haven't come across it yet, the HP Enterprise blog ran an article back in February that is worth reading today, May the Fourth, also known as Star Wars Day. While not as important as an opening day, 5/4 is a great day to geek out a bit and enjoy an article that shows [...]

Protecting against insider threats

By | April 17th, 2017|Blog|

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]

Maintaining audit and compliance reporting

By | March 13th, 2017|Blog|

I read an article recently that was titled, "You broke the network. Do you confess?" And it made me think about the audit and compliance reporting of the Uplogix platform, because it kind of takes the fun out of the question. The author of the original post on Reddit's /r/networking asked: "Have you ever accidentally [...]

IoT business justifications (+ a scary anecdote)

By | February 16th, 2017|Blog|

The Internet of Things (IoT) has never been short on hype or fear, but as real applications and deployments begin to factor into tactical business plans, calculating total cost of ownership (TCO) and return on investment (ROI) is required. Starting with costs, consider current environmental costs and implementation costs. The current environment includes what you are [...]

Satellite cybersecurity ramps up

By | February 7th, 2017|Blog|

Satellite operators have long felt just a little safer than most when it came to security. But today, satellite cybersecurity is standard operating procedure. No longer does an unobstructed beam bouncing off a satellite or remote locations guarantee security. Every day more of the world's critical infrastructure for communications, defense, financial, environmental monitoring, shipping and logistics -- [...]

2017 predictions for IT networking & security

By | December 12th, 2016|Blog|

Mid-way through the last month of the year means it's time for everyone to release their predictions for IT in the coming year. This year is no different, and given recent headlines about Russian hacking and ransomware designed to let you opt to infect others you know rather than pay up, we're going to talk [...]