IoT: The Weakest Link in Your Enterprise Security

Internet-of-Things-Header

Internet-of-Things-HeaderWhen most people talk about the Internet of Things (IoT) today, they’re usually referring to the cool gadgets and toys du jour – Google Glass, connected homes, iWatch and fitness bracelets etc. But it’s important to remember that IoT also applies to more mundane systems, such as lighting sensors, heating and cooling systems, vendor machines, commercial fridges, electronic gates, and many many other IP based systems that are likely already maintaining your enterprise – without you even realizing it.

Read more on IoT: The Weakest Link in Your Enterprise Security…

Key Network Security Questions You Need To Ask Your Cloud Vendors - Now!

cloud-question-marks-2

cloud-question-marks-2As we continue to hear the command “To the Cloud!” it seems that the cloud is not quite as resilient and secure as many were hoping.

Risks exist when relying on third parties to keep your business running and your information secure. So, you need to help minimize the chance of you or the business getting burned because of someone else’s lackadaisical approach to security.

Read more on Key Network Security Questions You Need To Ask Your Cloud Vendors – Now!…

Reduce, Reuse, Recycle: Tips on Re-Using Network Objects to Automate Connectivity Provisioning for Shared Applications

niBX546iA

niBX546iA

You likely have many servers in your data center, and many of them can probably be organized and categorize by multiple criteria such as operating system, function, or the network segment where the server will reside etc. In many cases each of these categories requires specific types of services and network access (DNS, NTP, Backup etc.).

Read more on Reduce, Reuse, Recycle: Tips on Re-Using Network Objects to Automate Connectivity Provisioning for Shared Applications…

Application Connectivity: There's a Map For That!

treasure2

treasure2Over the life cycle of an application, network connections tend to become more complex and the need for them may come and go. Yet it’s difficult to know how and why data flows between applications below the multiple overlapping layers. As a result, any significant update or effort to close down access runs the risk of outages, frustrated customers and unhappy executives if you don’t have good up-to-date documentation of your application connectivity architecture.

Read more on Application Connectivity: There's a Map For That!…

Water or Sports Channels? Why Net Neutrality is Important

WaterFaucet

WaterFaucetI’m sure over the past couple years you've heard the term “Net Neutrality” thrown around. In this post I’d like to discuss what it is and why it’s important, and what it’s not.

Read more on Water or Sports Channels? Why Net Neutrality is Important…

The Tribe Has Spoken – You are Voted off the Network

Tribal knowledge

Tribal knowledgeOne of the more interesting phenomena I have observed when working with companies on their network security challenges is that every company feels that their challenges are unique. While this is true to some extent, there are many more similarities than differences between companies. One such similarity is the existence of “Network Ned”.

Read more on The Tribe Has Spoken – You are Voted off the Network…