segmentation


By now, you will have all heard about the rampant spread of ransomware through countless press pieces, blog articles, and far too often, the outrageous claims of some security vendors. But let’s stop and think for a minute or two. How did these attacks happen? Are companies focusing on valid threats, fixing the right problems, or developing correct processes? Have so-called disruptive technologies disrupted our thinking? Let’s not go tactical. Instead, we need to consider, “what is our best strategy?” Ever since the... [Read More]
by RSS Michael Xie  |  Jul 06, 2017  |  Filed in: Industry Trends
Smart cities are being planned the world over. Technology development always goes through two phases for any new discipline: first – tools are developed, and infrastructure is built and enabled. And second – the technology is scaled up. In the case of smart cities, we are in the first phase, where many of the kinks and challenges are still being ironed out. Here are some examples of services a smart city might provide: Coordinated energy control of air conditioners at homes during hot summer days to manage and preserve city... [Read More]
by RSS Hemant Jain  |  Nov 24, 2016  |  Filed in: Industry Trends
Q: Why are conventional firewalls no longer enough? A: They never were to begin with. We caught up with Don Kopanoff at HIMSS 2016 to talk about the current state of security – and for him, it’s all about the rising complexity of threats. Last year, for example, upwards of 90 percent of identified viruses were unknown to the firewalls they infiltrated – meaning that if a firewall’s definitions aren’t aggressively updated, each passing day presents a new vulnerability. The increasing reliance on distributed... [Read More]
by RSS Susan Biddle  |  May 20, 2016  |  Filed in: Industry Trends
Our threat landscape is constantly evolving. As known vectors are exposed and neutralized, new methods emerge to take their places. And the current wave of advanced threats are getting increasingly better at slipping past perimeter security to reach the unprotected internal network. While edge firewalls do an excellent job of protecting the network border, they can’t help after a breach occurs. It might be malicious code that sits dormant for months before launching an opportunistic attack on critical infrastructure. Or it could be... [Read More]
by RSS Bill Mc Gee  |  Feb 24, 2016  |  Filed in: Industry Trends
Over the past year or so we’ve heard lots about segmentation and micro-segmentation as new ways to build effective cyber defences in enterprise networks and data centres… but is it enough? Can we delve even deeper? I believe there may be a third leg to the segmentation stool: pico-segmentation.   Before I explain, I think it worth a moment or two to talk about the first two legs of the stool. Segmentation or network segmentation is really all about controlling the flow of traffic from... [Read More]
by RSS Tyson Macaulay  |  Feb 23, 2016  |  Filed in: Industry Trends