Category Archives: Security
As long as enterprises are conducting critical business on the public internet, they will always be the targets and potential victims of a DDoS attack.
Most of us experience internet outages on an individual — and generally irregular — level. Perhaps we’re unable to check in with friends on social media, stream a movie or pull up a recipe for that evening’s dinner. The inconvenience is frustrating, but the impact is limited. 2016 may not have been when many people first became aware of the vulnerabilities featured in the underlying routing architecture of the public internet, but it remains a watershed year where these vulnerabilities became such prominent and repeated targets. This yielded a wider impact on communities and businesses from large-scale internet outages, caused by deliberate and malicious cyber-attacks. As industries, services and governments have grown more reliant on the public internet, malicious characters…
Data CIA – confidentiality, integrity, availability – is fundamental to a secure, reliable and functioning public internet. And, it’s failing us right now.
The retail point-of-sale, an element completely outside customers’ control, is particularly vulnerable to cyberattacks – especially during the holidays.
IT might live at the bleeding edge of innovation, but one of the fundamentals of modern IT security is still rooted in the early 1970s: the Principle of Least Privilege. When it was first introduced, the idea was that, to prevent breaches, every user should be given the minimal level of access to their organization’s IT infrastructure necessary to do their jobs. No more, no less. And, in theory, it made sense – limit the number of people who can reach your most sensitive data, and you limit your exposure to a breach. But, the Principle of Least Privilege was born at a time when the first floppy disks and microprocessors were barely off the assembly line. IT today is…
If we split IoT devices into 3 tiers, the highest would consist of well-protected devices, like laptops, that are complex machines with plenty of security software. The middle tier would be made of occasional use, moderate-complexity devices like thermostats, TVs, and refrigerators. Then we have the lowest tier.
Today, a major DDoS attack on the DNS provider Dyn sent shockwaves through the public Internet, rendering enterprise-critical platforms inaccessible.
As software-defined networking continues to increase in popularity as a flexible and dynamic approach to networking, it’s going to need a flexible and dynamic approach to security, as well. SDN forces security solutions to be proactive, protean, and responsive.