Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a bank branch office and used it to tunnel into the bank's local network, reports incident response firm Group-IB.
Application Security is much different than other security domains, so applying the standard methods does not necessarily address the unique challenges that AppSec can bring.
Network security is everywhere so naturally, we understand the need for securing the perimeter. However, application vulnerabilities, which...
With the increase in vulnerabilities in operational technology infrastructure, it's important to deploy unidirectional hardware gateways to restrict entry into OT networks, says Ajit Jha of L&T Technology Services.
Police recently arrested the suspected administrators and top users of the stresser/booter service Webstresser.org. Unfortunately, the plethora of such services means the world is unlikely to see a reduction in DDoS attack volumes, says Darren Anstee of Arbor Networks.
In late 2017, leading UK research house Vanson Bourne surveyed 2,700 IT managers to explore the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.
Download the results of the study and learn exclusive insights such as:
Organizations suffer on average 16...
Unwanted and evasive applications can have serious consequences for the security and performance of your corporate network. Yet a recent survey showed that on average 60% of network traffic is going unidentified. So why are firewalls struggling to identify network traffic? What are the risks with traffic you can't...
The explosion in the growth and diversity of devices linked to networks as a result of the internet of things and BYOD makes it more challenging to manage network security, says Wallace Sann of ForeScout.
The moats and castle approach is an antiquated, yet common way, of protecting the enterprise network.
Download this blog post to learn a new way to protect the enterprise that hides applications:
From the Internet
Outside of the firewall
With zero open ports and a minimal attack surface
In viewing this...
At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has sinkholed the control domain for the router botnet, which should help contain the potential damage.
If operational technology systems need to get connected to IT systems, it's essential to have tight controls on the network, says Lam Kwok Yan, professor of computer science and engineering at Nanyang Technological University in Singapore.
The rapid rise of cloud and mobile has created increased complexities for IT including managing the security risks as well as end user expectation. The question is, how to take advantage of the agility the cloud affords you while securing your applications in the cloud from Internet threats and still give users easy,...
Businesses that pursue digital transformation will face challenges with their ever-expanding attack surface, as well as their existing network and security architectures.
Download this report and learn why successful transformation requires the evolution of:
The traditional enterprise...
Legacy, perimeter-centric models of information security are of no use in today's digital businesses, according to a Forrester report sponsored by Akamai, as they are no longer bounded by the four walls of their corporation. Instead, CIOs must move toward a Zero Trust approach to security that is data- and...
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.