If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is that many enterprises use an internet perimeter firewall performing port address translation (PAT) with a default […]
IoT and the law of unintended consequences
You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news. In case you haven’t been paying attention, though, here’s the elevator pitch version: Fitness network Strava publishes a global heatmap of where users are running and working out […]
What is microsegmentation? How getting granular improves network security
Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs Network segmentation isn’t new. Companies have relied on firewalls, virtual local area networks (VLAN) […]
Ready for the EU’s GDPR compliance deadline? Many companies aren’t | Salted Hash Ep 16
CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.
Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves
Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why ‘serverless’ computing is a boon to devs and wonders why Apple’s HomePod seems late to the game.
Tech Talk: The beginning of the end of the password in 2018
Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password security.
The moving target of IoT security
As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure […]
Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]
Microsoft: Detecting in-memory attacks with Sysmon and Azure Security Center
In-memory attacks are on the rise and attracting increasing attention, as reported, for example, in these posts, SentinelOne: In memory attacks loom large, leave little trace, Hunting in memory, and Hunting for in-memory .NET attacks. These attacks involve the attacker carrying out malicious activities entirely in-memory, rather than writing a file to disk – as […]
VMware: Leading our Industry into a Software-Defined Future with Strategic M&A
At VMware, we’ve been a pioneer and leading innovator in “software defined” for nearly two decades. To get there, we have championed our own internal innovation, and augmented those efforts with acquired technologies. Previously, I outlined our three key tenets of our M&A strategy – platform acquisitions, industry acceleration acquisitions, and technology tuck-ins. This strategy […]