Penetration resistance gets too much focus, says NIST

[fsn_row][fsn_column width="12"][fsn_text] You've heard it here before -- it's not a matter of if, but when. At that point it's less about penetration resistance of trying to keep the bad guys out of your network, but how to minimize the damage and get back up and running. In a second volume to the National Institute [...]

Cisco: 75% of IoT initiatives not successful

In a study out from Cisco this week, one of the key vendors in IoT, says that only 26 percent of companies in their survey feel that they have been successful with their IoT initiatives. The danger zone for most IoT initiatives is the proof of concept (POC) stage, where 60 percent stall. The complexity of moving from [...]

Healthcare IT networks front line for cyberattacks

The month of August has seen a surge in cyberattacks on healthcare IT networks in the US using the Locky ransomware, a more highly evolved and effective version of the CryptXXX family of ransomware. Locky is so named because it locks down files and demands payment to free them and is distributed through social engineering methods. [...]

The continuing evolution of the CIO

Much has been made of how the role of the CIO is changing from a cost center manager to a driver of technological change that can help the business succeed or hit it out of the park. The continued decentralization of IT, which some estimates now put at more than more than half of technology spending [...]

Cybersecurity threats in 2016

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Security automation parallels network automation

An increasing number of security tools are providing automation capabilities to reduce the burden on security specialists when it comes to intrusion prevention, network access control, endpoint security and mobile device management. But to a large degree, these features sit unused. Legitimate worries about blocking business traffic accidentally and keeping business from operating as it [...]

“Flavor of the day” network security

Network security is tough. Too often a new attack vector appears on the scene and vendors scramble to put out a product to counter it. Companies scramble to implement it. And the bad guys scramble to find a new attack vector and it all starts over again. After a few cycles, this can lead to [...]

FBI publishes examples of IoT risks

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]

Putting air bags in a 1965 Mustang?

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]