The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to […]
Learn what the ‘zero trust’ security model really means | Salted Hash Ep 29
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
Cato Networks adds threat hunting to its Network as a Service
Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining […]
Study shows admins are doing a terrible job of patching servers
Open source has taken over the server side of things, but admins are doing a terrible job of keeping the software patched and up to date. Black Duck Software, a developer of auditing software for open-source security, has released its annual Open Source Security and Risk Analysis, which finds enterprise open source to be full […]
TSB phishing attacks | Salted Hash Ep 33
TSB customers in the U.K. were already frustrated by the bank’s technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit that powers them.
22 essential security commands for Linux
There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo – instead […]
How deception technologies use camouflage to attract attackers | Salted Hash Ep 26
Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.
22 essential Linux security commands
There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems. sudo Running privileged commands with sudo – instead […]
Asigra evolves backup/recovery to address security, compliance needs
As backup and recovery products and solutions evolve, they are beginning to intersect with security and compliance. Online backup and recovery software company Asigra has announced a new version of its software that addresses the risks posed by ransomware and non-compliance with Article 17 of the European Union’s General Data Protection Regulation (GDPR). Both should […]
Tech Talk: Prepping for GDPR
CSO’s Michael Nadeau and Steve Ragan join Computerworld’s Ken Mingis and IDG Communications’ Mark Lewis to look at what the new EU privacy rules means. They offer insights on how companies can prepare – and what happens if they don’t.