NAC or Microsegmentation: When is One More Appropriate?

NAC or Microsegmentation: When is One More Appropriate?

In today’s complex security landscape, businesses often wonder if Network Access Control (NAC) and microsegmentation serve the same purpose. While both contribute to securing networks, they address fundamentally different problems. This blog ...

Accelerating IPv6 Adoption – Transitioning from Cost Benefit to Security Benefit

The Introduction of IPv6 It is hard to believe that World IPv6 Launch Day was 12 years ago on 6 June 2012, and while worldwide adoption of IPv6 continues to accelerate, uptake ...
reachability, risk,

Reachability and Risk: Prioritizing Protection in a Complex Security Landscape

Understanding reachability is increasingly important for enterprises, as it can significantly influence their risk management strategies ...
Security Boulevard
NSDI '24

USENIX NSDI ’24 – Fast Vector Query Processing for Large Datasets Beyond GPU Memory with Reordered Pipelining

Authors/Presenters:Zili Zhang, Fangyue Liu, Gang Huang, Xuanzhe Liu, Xin Jin Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and ...
NSDI '24

USENIX NSDI ’24 – Horus: Granular In-Network Task Scheduler for Cloud Datacenters

Authors/Presenters:Parham Yassini, Khaled Diab, Saeed Zangeneh, Mohamed Hefeeda Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI ...

0.0.0.0 Day: 18-Year-Old Browser Flaw Affects Linux and macOS

Oligo Security’s research team recently uncovered a critical vulnerability dubbed the “0.0.0.0 Day” affecting Chromium, Firefox, and Safari browsers on macOS and Linux systems. This vulnerability allows malicious websites to bypass standard ...
BGP internet traffic network routing White House

How to Maximize Network Security With AI and ML

There is an increased focus on how advances in artificial intelligence (AI) and machine learning (ML) can negatively impact network security ...
Security Boulevard
Securing Kubernetes: The Risks Of Unmanaged Machine Identities

Securing Kubernetes: The Risks Of Unmanaged Machine Identities

Microservices and containers are changing the way businesses build, deploy, and manage their applications. Within a short span, these technologies have become the de facto standard for software development and distribution. Kubernetes, ...

BlastRADIUS Vulnerability Threatens Corporate Networks and Cloud – InkBridge Networks Guides Organizations Through the Fix  

The BlastRADIUS vulnerability announced July 9 by cybersecurity researchers involves the RADIUS protocol which underlies most network connections worldwide. When the researchers discovered this critical vulnerability, their first call was to Alan ...

BlastRADIUS Neutralized: Experts at InkBridge Networks Provide Fix for Critical Network Vulnerability 

The RADIUS experts at InkBridge Networks have developed a blueprint to resolve the BlastRADIUS critical network security vulnerability announced on July 9th. This vulnerability in the RADIUS protocol leaves essentially every piece ...