For networking pros, every month is Cybersecurity Awareness Month

When National Cybersecurity Awareness Month (NCSAM) was launched in October 2004, it was a modest affair, offering anodyne advice to individual Americans and US businesses along the lines of making sure to update your antivirus software twice a year.Since then NCSAM has grown into an event-packed month with star-studded guest panels, annual launches in various cities (looking at you, Ypsilanti, Michigan!), the participation of federal cybersecurity officials, and weekly themes. This year, for example, the themes in each successive week are:
Be Cyber Smart
Phight the Phish!
Experience. Share. (Cybersecurity Career Awareness Week)
Cybersecurity First

Linux security: Cmd provides visibility, control over user activity
Not sure why the organizers didn’t make “Cybersecurity First” the theme of the month’s first week, but it is not for me to second-guess the federal Cybersecurity & Infrastructure Security Agency (CISA) and the public/private National Cyber Security Alliance (NCSA), organizers of the annual awareness month.To read this article in full, please click here READ MORE HERE…

Read more

How and why automation can improve network-device security

The recent T-Mobile data breach, reportedly facilitated by attackers gaining access to an unprotected router and from there into the network, could have been prevented through the use of network automation.IDS, IPS, SASE, and other newer technologies get a lot more attention, but automation is critical to modern network security. Here’s a look at how automation should be used to enhance network security.To read this article in full, please click here READ MORE HERE…

Read more

Cisco patches three critical holes in IOS XE software

Cisco has patched three critical security holes in its IOS XE software that’s used across a variety of its core routers and switches.The three critical warnings are part of a big release of 32 security alerts, many of which are IOS XE-related, including firewall, SD-WAN and wireless access vulnerabilities.Linux security: Cmd provides visibility, control over user activity
Of the critical patches, the worst is a weakness in the Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers; it’s rated as a 10 out of 10 on the Common Vulnerability Scoring System (CVSS).To read this article in full, please click here READ MORE HERE…

Read more

Gartner: IT skills shortage hobbles cloud, edge, automation growth

Gartner says the current paucity of skilled IT worker is foiling the adoption of cloud, edge computing, and automation technologies.In its “2021-2023 Emerging Technology Roadmap” based on surveying 437 global firms, Gartner found that IT executives see the talent shortage as the most significant barrier to deploying emerging technologies, including compute infrastructure and platform services, network security, digital workplace, IT automation, and storage.To read this article in full, please click here READ MORE HERE…

Read more

Palo Alto launches an enterprise-grade security pack for remote workers

Palo Alto Networks has rolled out a Wi-Fi based package that the company says provides remote workers with enterprise-class security features.Called Okyo Garde, the bundle incuds Wi-Fi-6-based hardware and mobile application-security software that includes threat-intelligence updates, and sells the hardware and software to enterprises as a customizable subscription. The package also offers malware and ransomware prevention, phishing protection, infected device detection, and suspicious-activity monitoring and control, the company said.Linux security: Cmd provides visibility, control over user activity
Workers’ homes are becoming enterprise “branches of one” with multiple devices without IT teams or a deep set of cybersecurity protections, yet they face the same threat landscape as any enterprise, said Mario Queiroz, executive vice president of Palo Alto Networks. Threat actors may even see them as more vulnerable and therefore attractive entry points into the corporate network,  Queiroz said.To read this article in full, please click here READ MORE HERE…

Read more

What is Network as a Service (NaaS)?

The day is coming when enterprise IT professionals will be able to order network infrastructure components from a menu of options, have them designed to fit their business needs, and have the whole thing delivered and running in perhaps hours.The concept is called Network as a Service (NaaS), and it has been around in a number of different forms for a few years, mostly in the service provider arena.
Read more about NaaS:
NaaS is the future, but it’s got challenges
Cisco takes its first steps toward network-as-a-service
The 10 most powerful companies in enterprise networking
How to avoid the network-as-a-service shell game

For enterprises, the as-a-service concept took hold as companies started to embrace cloud computing and its model of consumption-based capacity. In the infrastructure space, for example, more than 75% of infrastructure in edge locations and up to 50% of data-center infrastructure will be consumed in the as-a-service model by 2024, according to research firm IDC.To read this article in full, please click here READ MORE HERE…

Read more

Department of Defense works to integrate battlefield intel networks

If yours is like most enterprises, it is under intense competitive pressure to understand faster, decide faster, and act faster in an increasingly dynamic environment.For businesses, that environment is the economy. But for the U.S. Department of Defense (DoD), the environment in which they must leverage technology and tactics against deadly adversaries is more like a battlefield. And all but the most self-aggrandizing sales directors would agree that the stakes on the battlefield are considerably higher than growing revenue and capturing market share. (Not that they are trivial!)
Read more: Cisco tool taps telemetry for network, security analyticsTo read this article in full, please click here READ MORE HERE…

Read more

Center for Internet Security: 18 security controls you need

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. These range from making an inventory of enterprise assets to account management to auditing logs.In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says.To read this article in full, please click here READ MORE HERE…

Read more

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks bolstered its security portfolio with products that target enterprise network users looking to make the move to a zero-trust environment.The new capabilities focus on a number of zero trust mechanisms—including  SaaS, cloud and DNS that will be available in June—and will make it significantly easier for organizations to adopt zero-trust security across the enterprise, according to Anand Oswal, senior vice president and general manager with Palo Alto.
More about DNS:
DNS in the cloud: Why and why not
DNS over HTTPS seeks to make internet use more private
How to protect your infrastructure from DNS cache poisoning
ICANN housecleaning revokes old DNS security key

As more people are working from anywhere, they require fast and always-on access to data and applications in the distributed cloud, regardless of location, Oswal said. “An all-encompassing zero-trust approach to network security is critical for safeguarding productivity in the new reality of remote, mobile, and hybrid work,” he said.To read this article in full, please click here READ MORE HERE…

Read more

Cisco CEO on security: “There is really no perimeter in the enterprise to defend anymore.”

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster
Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here READ MORE HERE…

Read more