Senin, 26 Desember 2022

The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.
http://dlvr.it/SfyDhW

Kamis, 22 Desember 2022

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default – not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored. The traditional approach to security was based on the concept of “trust, but verify.” The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits. Zero Trust principles change this to “never trust, always verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated. To read this article in full, please click here
http://dlvr.it/SfnGVh

Jumat, 16 Desember 2022

Data center networking trends to watch for 2023

Hybrid and multicloud initiatives will continue to shape enterprise IT in 2023, and the impact on data-center networking will be felt across key areas including security, management, and operations. Network teams are investing in technologies such as SD-WAN and SASE, expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments. “The most important core trend in data centers is the recognition that the hybrid cloud model – which combines current transaction processing and database activities with a cloud-hosted front-end element for the user interface – is the model that will dominate over time,” said Tom Nolle, president of CIMI Corp. and a Network World columnist. The industry is seeing a slow modernization of data center applications to support the hybrid-cloud model, Nolle says, “and included in that is greater componentization of those applications, a larger amount of horizontal traffic, and a greater need to manage security within the hosted parts of the application.” To read this article in full, please click here
http://dlvr.it/SfV4q7

Kamis, 15 Desember 2022

Selasa, 13 Desember 2022

Ransomware: It’s coming for your backup servers

Backup and recovery systems are at risk for two types of ransomware attacks: encryption and exfiltration – and most on-premises backup servers are wide open to both. This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention. Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. And it seems no one wants to do something about it lest they become the new backup expert responsible for the server. This is an age-old problem that can allow backup systems to pass under the radar of sound processes that protect most servers. To read this article in full, please click here
http://dlvr.it/SfKBFx

Senin, 12 Desember 2022

Top 10 Best Residential Proxy Service Providers

The need to surf the internet freely without restrictions or being noticed created the necessity for proxies. So, what is a proxy? To put it in simple terms, a proxy is a device that provides a gateway between users and the web. Therefore, it helps prevent cyber attackers from gaining access to a private network. A proxy is a computer, referred to as an intermediary because it channels traffic between end-users and the web content they visit online. In data gathering, proxies enable you to access data from websites without being detected, increasing the success rate of extracting valuable information. Top 10 Best Residential Proxy Service Providers Several residential proxy providers claim to provide the ultimate security for your web activities and enable you to browse anonymously. However, some providers' services don't come close to what they claim to provide. Having stated that, the following providers will give you value for your money. If you need a reliable residential proxy, they will come to the rescue. To read this article in full, please click here
http://dlvr.it/SfDss4

What is SASE? A cloud service that marries SD-WAN with security

Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies. First outlined by Gartner in 2019, SASE (pronounced “sassy”) has quickly evolved from a niche, security-first SD-WAN alternative into a popular WAN sector that analysts project will grow to become a $10-billion-plus market within the next couple of years. To read this article in full, please click here
http://dlvr.it/SfCyFW

Selasa, 06 Desember 2022

Ransomware attack knocks Rackspace’s Exchange servers offline

Cloud services and hosting provider Rackspace Technology acknowledged Tuesday that a recent incident that took most of its Hosted Exchange email server business offline was the product of a ransomware attack. The company shut the service down last Friday. It was not, initially, clear what had caused the outage, but Rackspace quickly moved to shift Exchange customers over to Microsoft 365, as this part of the company’s infrastructure was apparently unaffected. Rackpsace offers migration to Microsoft 365 Rackspace said today that there is “no timeline” for a restoration of Exchange service, but it is offering Exchange users technical assistance and free access to Microsoft 365 as a substitute, though it acknowledged that migration is unlikely to be a simple process for every user. Rackspace said that, while the migration is in progress, customers can forward email sent to their Hosted Exchange inboxes to an external server, as a temporary workaround. To read this article in full, please click here
http://dlvr.it/SdyBBv

12 killer (and free) tools for network engineers

The job of a network engineer just keeps getting more complicated. Mission critical applications are competing for bandwidth. The sheer number of devices is exploding, driven by IoT. And the network itself if being extended to the cloud, the edge and to the home office.   And then there’s cybersecurity to worry about. Attacks are on the rise across the board, and attackers are constantly looking for vulnerabilities or backdoors, upping the need for solid and secure networking to act as an early warning system for cybersecurity defenses. Thankfully, there are many great tools available to help network engineers complete their never-ending tasks. And many of them are available for free. Here’s our list of 12 killer network tools that won’t break the bank.  To read this article in full, please click here
http://dlvr.it/SdxRWN

Kamis, 01 Desember 2022

Researchers found security pitfalls in IBM’s cloud infrastructure

A demonstrated attack by cybersecurity researchers in IBM’s cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.
http://dlvr.it/Sdgv9g

Versa extends SASE platform to the LAN edge

Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers bette...