RSA: Cisco launches SASE, offers roadmap for other cloud-based services
Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.The biggest piece of the Cisco ro.....»»
Who is selling Zero Trust Network Access (ZTNA) and what do you get?
Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.Much of this i.....»»
6G cellular doesn’t exist, but it can be hacked
Arriving at a consensus on when 6G wireless will be widely available commercially is all but impossible, as this small sample size shows: Northeastern University researchers: More than five years, but probably not long after Nokia CEO Pekka Lundma.....»»
U.S. government proposals spell out 5G security advancements
A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks......»»
VPNs can complement SASE
The pandemic has accelerated the development of better ways to serve and secure remote workers, which make it a good time to re-examine VPNS.Recently VPNs have received technical boosts with the addition of protocol options that improve functional.....»»
Cisco SD-WAN software gains broader application access, enhanced analytics
Cisco has tweaked its flagship SD-WAN software package to increase customer application flexibility and improve visibility into the performance of distributed resources.The company announced Cisco SD-WAN release 17.8, which adds support for new bu.....»»
5 VMware products need patching against serious security vulnerabilities
Virtualization and cloud vendor VMware this week disclosed eight vulnerabilities in five of its products, and urged users of Workspace ONE Access and all its products that include VMware Identity Manager components to patch immediately.Three of th.....»»
10 essential Linux tools for network and security pros
Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them.There are different sets of tools for just about every task—netw.....»»
IBM z16: A mainframe designed for AI, hybrid cloud, security and open source
Today’s announcement of IBM’s new z16 mainframes promises a system that caters to enterprise needs that include support for AI, security, hybrid cloud, and open source efforts well into the future.The new, more powerful and feature-rich Big Ir.....»»
Fortinet tightens integration of enterprise security, networking controls
Fortinet has made available a new release of its core FortiOS software that includes features the vendor says will help enterprises more tightly meld security and networking controls.FortiOS 7.2, has 300 new features including AI support to help s.....»»
Zero trust requires network visibility
In a zero-trust environment, trust is not static. Behavior has to be visible for trust to persist.To read this article in full, please click here(Insider Story).....»»
CISA warns of attacks against internet-connected UPS devices
Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately......»»
Palo Alto launches cloud-native firewall service for AWS
Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says......»»
Use zero trust to fight network technical debt
Zero trust (ZT) is a mindset and a method, not a technology. The current push to adopt ZT is driven by an urgent and growing need to make a major leap forward in risk management and attack containment in enterprise networks, a need driven home by eve.....»»
Critical flaws in APC uninterruptible power supplies poses risks to mission-critical devices
Attackers can exploit cloud-connected APC Smart-UPS units to take control of the devices they protect......»»
Log4j flaw needs immediate remediation
After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the r.....»»
Aryaka broadens enterprise targets with managed SD-WAN, SASE services
Aryaka Networks is looking to target more enterprises with a new managed secure access service edge (SASE) offering and an improved, lower cost SD-WAN offerings.Aryaka is known for offering WAN and SD-WAN services over its global Layer 2 network w.....»»
How to buy SASE
Wouldn’t it be great if there were a cloud-based service that combined networking and security so that users located anywhere could safely and efficiently access applications and data located anywhere? That’s the aim of SASE (rhymes with gassy.....»»
Cisco hit with software and physical issues
Cisco Systems has been hit with an unusual double-whammy of issues, one of them in software and one in hardware.First, the more serious issue, a firewall flaw. Security researcher Positive Technologies, which hunts for security vulnerabilities, po.....»»
SmartNICs set to infiltrate enterprise networks
Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components--the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the i.....»»