The original title for this story was "Transitioning from IPv4 to IPv6," but when we started researching, we quickly realized that most organizations are adopting an outside-in strategy, rather than moving over from all-IPv4 to all-IPv6 deployments. This means that they're often taking steps to accommodate incoming and outgoing IPv6 traffic at the organizational boundary and translating between the two stacks, or tunneling one protocol over another, for internal access and use. The majority of internal clients and other nodes are using IPv4, with increasing use of IPv6 in dual-stack environments (environments that run IPv4 and IPv6 protocol stacks side-by-side).To read this article in full or to leave a comment, please click here(Insider Story)
The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.To read this article in full or to leave a comment, please click here(Insider Story)