Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), Unified Computing System (UCS) software and Nexus switch operating system (NX-OS) .Network pros react to new Cisco certification curriculum
The firewall and UCS vulnerabilities all have a severity level of “high” on the Common Vulnerability Scoring System and include:To read this article in full, please click here
Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources.Cisco describes the new SecureX service as offering an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can then automate and orchestrate security management across enterprise cloud, network and applications and end points.Network pros react to new Cisco certification curriculum
“Until now, security has largely been piecemeal with companies introducing new point products into their environments to address every new threat category that arises,” wrote Gee Rittenhouse senior vice president and general manager of Cisco’s Security Business Group in a blog about SecureX.To read this article in full, please click here
Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats.With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center. The moves are part of Juniper's grand Connected Security platform that includes a variety of security products including its next-generation firewalls that promise to protect networked resources across infrastructure and endpoints.To read this article in full, please click here
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical components of the CCPA and answer viewers’ questions.
With the combined challenges of tight IT budgets and scarcer technical talent, it’s becoming imperative for enterprise network pros to embrace automation of processes and the way infrastructure responds to changing network traffic.Not only can automation help address these problems, they can also improve overall application-response time by anticipating and addressing looming congestion. Modern applications, such as virtual reality and artificial intelligence, and architectures that incorporate IoT and hybrid cloud have yet to reach their true potential because network capacity seems to always lag behind demand. A common problem is that too much networking infrastructure is still manually maintained and managed, but major vendors are starting to addressing these issues, as are startups that seek to break bottlenecks through automation.To read this article in full, please click here
With the combined challenges of tight IT budgets and scarcer technical talent, it’s becoming imperative for enterprise network pros to embrace automation of processes and the way infrastructure responds to changing network traffic.Not only can automation help address these problems, they can also improve overall application-response time by anticipating and addressing looming congestion. Modern applications, such as virtual reality and artificial intelligence, and architectures that incorporate IoT and hybrid cloud have yet to reach their true potential because network capacity seems to always lag behind demand. A common problem is that too much networking infrastructure is still manually maintained and managed, but major vendors are starting to addressing these issues, as are startups that seek to break bottlenecks through automation.To read this article in full, please click here
We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep web and dark web apart from the rest of the web.
The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what group is best to decide?Both the makers of IoT devices and governments are aware of the security issues, but so far they haven’t come up with standardized ways to address them.[Get regularly scheduled insights by signing up for Network World newsletters.]
“The challenge of this market is that it’s moving so fast that no regulation is going to be able to keep pace with the devices that are being connected,” said Forrester vice president and research director Merritt Maxim. “Regulations that are definitive are easy to enforce and helpful, but they’ll quickly become outdated.”To read this article in full, please click here
Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make – a daunting wealth of possibilities that is difficult to keep track of.Because of this richness of features, next-generation firewalls are difficult to master fully, and important capabilities sometimes can be, and in practice are, overlooked.Here is a shortlist of new features IT pros should be aware of.To read this article in full, please click here
AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?
Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products – from switches and routers to web cameras and desktop VoIP phones. The problems center around vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) that could let remote attackers take over the products without any user interaction. While no public exploit has been found, an attacker simply needs to send a maliciously crafted CDP packet to a target device located inside the network to take advantage of the weakness, Cisco stated.Cisco’s CDP is a Layer 2 protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby, according to Cisco. It enables management of Cisco devices by discovering networked devices, determining how they are configured, and letting systems using different network-layer protocols learn about each other, according to Cisco.To read this article in full, please click here
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" within the app, not a hack or attack. Computerworld's Lucas Mearian joins Juliet to discuss the problem with mobile voting and how this snafu may affect the reputation of app voting in the future.
Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio. More about edge networkingTo read this article in full, please click here