security

May 30, 2017

DATA CENTER

How to Secure Your Data Centre: The Importance of Whitelist Policies

Growing up in Britain, a fair share of our history lessons covered the black death. It was a truly horrible plague that affected all without prejudice, ravaging the young and old throughout towns, cities, countries and the continent with seemingly no end. Surprisingly, it’s hard to remember everything from that class (hey, it was quite […]

May 30, 2017

THREAT RESEARCH

BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused

Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available.  Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode.  We won’t promise it’s anything […]

May 24, 2017

HEALTHCARE

Celebrate HIPAA compliance like it’s 1999

Take a trip with me, if you will, back to the turn of the 21st century – when “digital transformation” was but a gleam in our eyes. Back then, we barely had email at work. The internet was still kind of a novelty. And social media had yet to be invented. (How did we survive?) […]

Delivering a New and Improved Online World

Service provider networks are at the epicenter of digitization. You need to be faster, more efficient, more focused on strategic partnering and security obsessed. Here are some suggestions for how to do it.

Holistic Security Enables SPs to Transform and Embrace the Connected Future NOW

Digitization is opening up new opportunities for business expansion. Although these new trends introduce new opportunities to service providers, it also presents new vulnerabilities and risks from hackers and cyber attacks.

Pay TV in Asia – Where is the puck going?

Fifty countries, 4.5 billion people, a multitude of cultures and economies. And that variation includes the way people watch TV. Learn more about the new era of Pay TV.

May 19, 2017

CLOUD

Securing OpenStack Networking

Cloud Security is currently top of mind for IT. In this blog post, I will provide a 10 point checklist to help you secure your OpenStack Neutron networking service. Ensure that you use “Defense in depth” as the primary security strategy and deploy a series of defensive mechanisms, as no single method exists for successfully protecting your entire service. This strategy ensures that even if one mechanism is compromised, another will be there to defend against the attack. Design network security in layers. So, instead of creating a single layer of network security protection at the perimeter, apply network security to every layer of the network, every component of the networking service and the communication channel.

Enough is Enough – Change Must Begin Now

Beginning last week, many organizations around the globe found themselves responding to infected computers in their environments that were hit with new malicious ransomware called “WannaCry.” Most other organizations reacted quickly to protect their network-critical files from being taken hostage by cyber criminals and held for ransom. And we are now seeing new variants of […]

May 16, 2017

EDUCATION

Held for Ransom(ware): Protecting Your School—and Data—from Current Cyber Threats

It is no longer a matter of “if” your organization will suffer a security breach; it’s a matter of “when.” Learn how to protect your school.