#Network Security


FBI: Hackers Behind 'Cuba' Ransomware Have Earned at Least $43.9 Million

A ransomware group called Cuba has managed to extort $43.9 million from victims, according to the FBI, which published a warning about the group’s attacks on Friday. According to federal investigators, the hackers have compromised at least 49 entities involved in critical infrastructure sectors, including healthcare, manufacturing, IT, government, and finance.
Picture for FBI: Hackers Behind 'Cuba' Ransomware Have Earned at Least $43.9 Million

Reps. Pallone, Doyle praise House cybersecurity legislation passage

Energy and Commerce Committee Chairman Frank Pallone, Jr. (D-NJ) and Communications and Technology Subcommittee Chairman Mike Doyle (D-PA) applauded the House of Representatives’ passage of three cybersecurity bills. “The House came together to pass three critical bipartisan bills that aim to strengthen our telecommunications networks for a safer, more secure...
Picture for Reps. Pallone, Doyle praise House cybersecurity legislation passage

Securely connecting the hybrid workforce and network edge: SD-WAN’s role in a SASE architecture

Over the last 20 years of enterprise computing, we’ve seen big changes in work environments and IT setups. At the turn of the millennium, most employees worked at headquarters or in a branch office, and most software ran from on-site servers. Networks were designed with centralized architecture, with all traffic being routed through the corporate data center over MPLS or VPN. As a result, the entire security stack could be deployed on-premises in a single place.
Picture for Securely connecting the hybrid workforce and network edge: SD-WAN’s role in a SASE architecture
Network World

The 3 Drivers of Zero Trust Network Access Implementation

It's human nature to put off tasks that aren't urgent. Whether it's planning that never ends or simple procrastination, it's easy to let timelines slip until an external force lights a fire under the project. At many organizations, that's what's happened with Zero Trust Network Access (ZTNA). The zero-trust security...

5 Cybersecurity Tips for Small Businesses

If you think you aren’t at risk of cybercrime because your company isn’t large, think again. Believe it or not, 64% of all companies worldwide have suffered from some form of cybercrime. That means you can’t cut corners when protecting your business from online attacks. If you’re still trying to...

Zero Trust Network Access is critical for today’s mobile worker

Today, more organizations are offering the option to work from home, in the office or a mix of both, and company leaders are being forced to contend with the issues that come with this work landscape, looking for options to increase protection and achieve airtight cybersecurity. About the author. Aaron...

SD-WAN is ready to get rid of its training wheels

SD-WAN is moving from a network to a software. It will continue to evolve, Sven Muller, Colt Technology Services’ IP product director, said that it will benefit from agility, on-demand and fluid bandwidth innovations. These will be complemented by cloud-native security and security enhancements. It is rapidly changing the role...

How to Reduce the Financial Impact of Cyberattacks to Your Business

There has been a steady stream of significant cyberattacks headlining the news since December 2020 and the Sunburst attack on SolarWinds Orion platform. Fueled by the anonymity afforded by payments made in cryptocurrency, cyber criminals have stepped up their attacks and have gotten bolder with their ransom demands, often seeking millions of dollars.
Design Taxi

Planned Parenthood Breach Leaves Details Of 400,000 Patients Exposed

Image ID 83565602 © via Ken Wolter | Planned Parenthood Los Angeles (PPLA) officially confirmed that a massive data breach exposed 400,000 patients’ records online. The hack, which occurred last month, saw names, dates of birth, addresses, insurance identification numbers, and clinical data unmasked. According to CNET, an unauthorized...

3 Steps To Take When Implementing Cloud-to-Edge Service Models

With the rapid push toward remote work, the pandemic catapulted enterprises into the age of anywhere operations. Nearly 50% of all employees will remain remote, creating challenges, opportunities, and security risks for IT organizations. Through this level of digital transformation, enterprise technologists have been encouraged to accelerate cloud migrations, increase end user satisfaction, automate service delivery, protect the entire infrastructure, and cut costs. These goals can be daunting and difficult to achieve collectively, but with the right creative strategies, they are attainable.

Cloud WAN brings a Secure MPLS-like Experience to AWS

It’s no coincidence that SD-WAN adoption has grown rapidly with increasing cloud consumption by enterprises. After all, the primary use case for SD-WAN is to provide fast and resilient connectivity to cloud services. While the SD-WAN migration has been driven by cost savings, faster time to provision, and more application control, there have been some trade-offs. MPLS provides granular control of routing domains and segmentation, and centralized Internet breakout for consistent egress security and partner interconnection. MPLS’s traffic-engineered paths provide end-to-end low network latency and a high quality of service. The launch of AWS’s Cloud WAN provides, for the first time in the AWS cloud, the opportunity to realize the benefits of an MPLS-like core network with the advantages of SD-WAN cloud on-ramps from many on-premises locations.

Taking on the Secure SD-WAN Fight

As we’re all now well aware, traditional hardware-based approaches to direct network traffic, connecting employees and offices to necessary resources and applications, simply doesn’t cut it anymore. Backhauling traffic to a central data center is inefficient, costly and impacts the user experience due to performance issues when accessing cloud and SaaS resources. However, these centralized data centers are often where the full security stack resides, creating the uncomfortable debate of security versus performance. Work is an activity, not a place, and inconsistencies in network performance, visibility and security for users at home or in offices are challenges for our cyber and IT teams.

Zero Trust Network Access (ZTNA) vs. VPN: How they differ

Before 2020, there were signs of a growing — albeit slow — shift to remote work. But during the COVID-19 pandemic, organizations were forced to quickly adopt hybrid or remote work policies to keep operations running and protect their workforce. Since then, IT teams have continued to deploy corporate applications and desktops in the cloud while allowing remote employees to use unmanaged devices and unsanctioned networks to do their jobs. Consequently, this has opened the door to a plethora of inherent network security risks.

Preventing Malvertising Requires An Ecosystem Of Security

CMO at Adsterra, with 10+ years of experience in marketing global brands. Gala is a judge in the International Performance Marketing Awards. Cybercriminals never stop working, which means modern companies can never let their guard down. It’s not just a problem for tech companies; if you have a website or simply accept credit card payments, the bad actors who divert web traffic and steal customer data might set their sights on you next.

Aviatrix Achieves AWS Security Competency Status

Standout Achievement Demonstrates Company’s Technical Proficiency and Customer Success in Securing AWS Workloads and Cloud Environments. Aviatrix, a leader in cloud networking and network security, has been awarded the Amazon Web Services (AWS) AWS Security Competency. This achievement demonstrates Aviatrix’s commitment to empowering cloud infrastructure teams with network security capabilities that are native in the Aviatrix Cloud Network Platform for AWS customers.
The Tech Report& LLC

6 Must-Have Network Security Solutions for Enterprise

Enterprise cybersecurity is a complex challenge to tackle. The wide range of enterprise application technology, from network endpoints to IoT connectivity, makes security a puzzle. Where does an enterprise begin, and which solutions offer the best fit?. While many service providers offer end-to-end solutions, the best approach is to adopt...

Understanding the Attack Chain Helps to Counter Threats

Security teams are struggling to keep pace with the changes in their networks. Hybrid work, multi-cloud, the explosion of IoT and BYOD devices, and 5G. Meanwhile, cybercriminals have been undergoing their own digital transformation. Machine learning and agile development, new sophisticated attacks, combined with Dark Web crime-as-a-service offerings mean that attacks are faster, harder to detect, and better at finding and exploiting vulnerabilities. In fact, a recent FortiGuard Labs threat report demonstrated that ransomware increased tenfold in the last year.
Dark Reading

Top 5 Reasons to Get 'SASE' With Security

What’s the key to effective security? How can we continue to defend against the ever-rising tide of cyberattacks amid a constantly evolving perimeter and the unprecedented acceleration of hybrid work? And let's not forget about the proliferation of devices connecting to the network, and the mass movement of applications into the cloud.