Software Contract Solutions

Report: Most IoT transactions are not secure

Data gathered by security provider Zscaler shows that not only are most internet-of-things transactions unsecured, they are also unauthorized as IoT creeps in as shadow-IT devices. The majority of Internet of Things (IoT) transactions don’t use even basic security, and there is a great deal of unauthorized IoT taking place inside the perimeter of enterprise firewalls thanks … Read more

How IT pros deal with SD-WAN security concerns

When baseline SD-WAN security is not enough, enterprises are adopting extra measures such as intrusion prevention, anti-virus, unified threat management and more. SD-WAN technology is becoming increasingly popular because it’s less expensive, more flexible and easier to deploy than MPLS, it provides centralized visibility and management, and it boosts the overall performance of WAN links, which makes employees more … Read more

Cisco security warnings include firewall holes, Nexus software weaknesses

Cisco details security vulnerability warnings with Firepower firewall (FXOS), Unified Computing System software and Nexus (NX-OS) switch operating system. Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS),  Unified Computing System (UCS) software and Nexus switch operating system (NX-OS). The firewall and UCS vulnerabilities all have a severity level … Read more

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive. The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what … Read more

IT pros need to weigh in on that ‘sassy’ security model

The secure-access service edge (SASE) model developed by Gartner ties into SD-WAN, edge computing and SD-Branch, so it warrants attention from networking teams. Cloud services that provide both network and security intelligence are gaining popularity because they are easy to consume and they improve agility. Similarly, a model known as SD-Branch is providing network and security functionality … Read more

AI, automation emerge as critical tools for cybersecurity

Organizations find new ways to relieve some of the burden on security teams while shoring up defenses. Artificial intelligence and automation adoption rates are rising, and investment plans are high on enterprise radars. AI is in pilots or use at 41% of companies, with another 42% actively researching it, according to the 2019 IDG Digital Business … Read more

DRaaS decisions: Key choices in disaster recovery as a service

We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources. The way businesses buy disaster recovery is changing – and rapidly. Over the last few years, the growth of cloud-based data storage – led by Amazon’s S3 but closely followed by … Read more

10 cyber security trends to look out for in 2020

What cyber security trends and issues can the world expect in 2020: more stringent regulation, creations of new roles? When looking for possible cyber security trends in 2020, it is clear to see that 2019 was an interesting year for all things cyber security. It was the year that brought major breaches pretty much every … Read more

Cisco Meraki ups security with new switch, software

Cisco is bringing some of the bells and whistles of its Catalyst environment to Meraki customers with hardware and software to help customers better support and secure distributed network resources. Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network … Read more

AI in cyber security: a necessity or too early to introduce?

The threats against organizations are growing in volume and success, but can AI in cybersecurity stop the rot and turn failure into success? There is a list of growing cyber security threats, ranging from a rise in identity thefts and account takeovers to vindictive ransomware strains. Businesses are feeling the strain, especially Fortune 500 enterprises, … Read more