Hardware/Network

Back to homepage

The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual organization,

One hundred percent of endpoint security tools eventually fail

Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the

VPN Vulnerabilities Point Out Need for Comprehensive Remote Security

VPNs are the primary tool for securing remote access, but recently disclosed vulnerabilities point out the weakness of relying on them as the only tool. “Encryption Everywhere” has become one

Army researchers identify new way to improve cybersecurity

With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it.

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.In 2017, my colleague Doug Cahill conducted research on endpoint security. Back then, the research indicated that

Major vulnerabilities found in new Wi-Fi standard

The latest WPA3 WiFi security and authentication standard may be suffering from serious safety flaws of its own.  This is according to a group of researchers – Mathy Vanhoef and Eyal Ronen, who issued

5 Questions to Help Chart Your Course to Zero Trust Security

It wasn’t that long ago that businesses restricted employees from doing certain activities online. Despite spending most of their time on the road, sales teams but could only access customer

Vulnerabilities in smart IP cameras expose users to privacy, security risks

Bitdefender has found new vulnerabilities in IoT cameras that are meant to be protecting people’s homes. The global smart camera market is predicted to grow at a CAGR of 8

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

In 2019 we have reached a new turning point in the adoption of IoT – more markets and industries are migrating to a cloud-based infrastructure, and as the IoT continues to gain

4 ways to minimize IoT cybersecurity risk

Few technology trends are growing as quickly as the internet of things. According to Bain & Company, the markets for IoT hardware, software, systems integration, data and telecom services will grow