Remove Firewall Remove IoT Remove Mobile Remove Network Security
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Network Security: Study network protocols, such as TCP/IP, and analyze common network attacks like DDoS, phishing, and man-in-the-middle attacks. Research network security mechanisms, such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs).

article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. Is it surprising that there’s a correlation between something like IoT exposure and other security issues?

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

The Last Watchdog

The problem here is that a secured, cost-effective, and efficient networkmust be developed to support remote operations at scale. Many enterprises have accelerated their use of Virtual Private Network (VPN) solutions to support remote workers during this pandemic. Unmonitored IoT devices are inherently insecure.

B2C 215
article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

Greg Fitzerald, co-founder of Sevco Security , disclosed to eSecurity Planet that their recent State of the Cybersecurity Attack Surface research found “11% of all IT assets are missing endpoint protection.” Some of this 11% includes the common and recurring problem of overlooked legacy endpoints such as laptops, desktops, and mobile devices.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. A methodical drive has been underway for at least the past decade to affect a transition to a new network security paradigm – one less rooted in the past and better suited for what’s coming next.

Firewall 224
article thumbnail

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

The Last Watchdog

TLS is the glue that holds together not just routine website data exchanges, but also each of the billions of machine-to-machine handshakes occurring daily to enable DevOps, cloud computing and IoT systems. However, the sudden, super-saturation of TLS, especially over the past two years, has had an unintended security consequence.

article thumbnail

Ivanti Policy Secure: NAC Product Review

eSecurity Planet

Features Automated threat responses to indicators of compromise Centralized visibility and policy management of all endpoints — workstations, laptops, and internet of things (IoT) devices Bidirectional third party integration to improve security and auditing Firewalls: Checkpoint, Fortinet, Juniper, Palo Alto Networks, etc.

IoT 97