How to Secure Your Data Centre: The Importance of Whitelist Policies
Growing up in Britain, a fair share of our history lessons covered the black death. It was a truly horrible plague that affected all without prejudice, ravaging the young and old throughout towns, cities, countries and the continent with seemingly no end. Surprisingly, it’s hard to remember everything from that class (hey, it was quite […]
BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused
Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We won’t promise it’s anything […]
Celebrate HIPAA compliance like it’s 1999
Take a trip with me, if you will, back to the turn of the 21st century – when “digital transformation” was but a gleam in our eyes. Back then, we barely had email at work. The internet was still kind of a novelty. And social media had yet to be invented. (How did we survive?) […]
Delivering a New and Improved Online World
Service provider networks are at the epicenter of digitization. You need to be faster, more efficient, more focused on strategic partnering and security obsessed. Here are some suggestions for how to do it.
Holistic Security Enables SPs to Transform and Embrace the Connected Future NOW
Digitization is opening up new opportunities for business expansion. Although these new trends introduce new opportunities to service providers, it also presents new vulnerabilities and risks from hackers and cyber attacks.
Securing OpenStack Networking
Cloud Security is currently top of mind for IT. In this blog post, I will provide a 10 point checklist to help you secure your OpenStack Neutron networking service. Ensure that you use “Defense in depth” as the primary security strategy and deploy a series of defensive mechanisms, as no single method exists for successfully protecting your entire service. This strategy ensures that even if one mechanism is compromised, another will be there to defend against the attack. Design network security in layers. So, instead of creating a single layer of network security protection at the perimeter, apply network security to every layer of the network, every component of the networking service and the communication channel.
Enough is Enough – Change Must Begin Now
Beginning last week, many organizations around the globe found themselves responding to infected computers in their environments that were hit with new malicious ransomware called “WannaCry.” Most other organizations reacted quickly to protect their network-critical files from being taken hostage by cyber criminals and held for ransom. And we are now seeing new variants of […]
Held for Ransom(ware): Protecting Your School—and Data—from Current Cyber Threats
It is no longer a matter of “if” your organization will suffer a security breach; it’s a matter of “when.” Learn how to protect your school.