Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The Dragonfly group, also known as Energetic Bear is using spear phishing campaigns and malware-infected websites to collect credentials for corporate networks. Dragonfly has been active since at least 2011 and was exposed by security analysts in 2014. Afterwards, the group seemed to go underground and has only recently emerged again in the public eye. Symantec researchers refer to the current attacks as "Dragonfly 2.0" because they replicate many aspects of the previous attacks. The attacks target industrial control systems (ICS) which belong to companies that operate pipelines, generate electricity, and other energy-related companies. The Dragongly group appears to be particularly active in Switzerland, Turkey and North America.
Read more

5 Key Items for the Digital Transformation of Healthcare

People’s lives are at risk as the healthcare industry transforms patient care with modern IT technologies. Data security and application availability are essential when a patient’s medical information is on the network. Hospitals and medical practices are digitizing healthcare applications like x-rays, CAT scans, medication distribution and surgical procedures using interactive video. In addition, patient The post 5 Key Items for the Digital Transformation of Healthcare appeared first on Radware Blog.
Read more

Take a Dynamic Approach to SDN Security

Virtualized networks and SDN (software-defined network) architectures are “the next big thing,” offering businesses new opportunities to grow and change. They bring together far-flung facilities in a single, secure network and let people from all locations communicate as if they were in the same building. SDNs also create big challenges to IT and cybersecurity teams.… The post Take a Dynamic Approach to SDN Security appeared first on CCSI.
Read more

The Rise of Cloud-based Services Fuels Demand for Managed VPNs

The growing popularity of cloud services coupled with security concerns is driving demand for managed VPNs. In particular, the success of public cloud services is gradually encouraging more enterprises to move away from conventional remote network access methods in favor of cloud-based remote access. Providing remote access via the public cloud brings organizations multiple advantages including ease of management, flexibility and lower costs. However, opinions are divided over the level of security it affords. Most users of public cloud services consider security a primary benefit. Yet mistakes can and do happen, leading to high profile consequences. One aspect of cloud management technology that is not in dispute is its capacity to simplify secure VPN connectivity for large numbers of remote workers.
Read more

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics displacing old doctrines and plans. For example, the defensive advantage of the Greek phalanx was eventually outmaneuvered by the Roman legion. Later, improvements in fortifications and armor led to castles and The post 2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1) appeared first on Radware Blog.
Read more
Page 1 of 1012345...10...Last »