Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and […]
Secure software-defined WAN (SD-WAN) has become one of the hottest new technologies, with some reports claiming that 85% of companies are actively considering SD-WAN to improve cloud-based application performance, replace expensive and inflexible fixed WAN connections, and increase security. But now the industry is shifting to software-defined branch (SD-Branch), which is broader than SD-WAN but […]
We are making it easier for customers to “lift and shift” applications to the cloud while maintaining the same security model used on-premises with the general availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files. By integrating Azure AD DS, you can mount your Azure file share over SMB using […]
Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure. Among these capabilities is Azure disk encryption, designed to help protect and safeguard your data to meet your organizational security and […]
Edge Chromium can provide more protection for organizations that use older versions of Windows.
The STRONTIUM hacking group, which has been strongly linked by security researchers to Russia’s GRU military intelligence agency, was responsible for an IoT-based attack on unnamed Microsoft customers, according to the company. a blog post from the company’s security response center issued Monday. Microsoft said in a blog that the attack, which it discovered in […]
Back when this blog was dedicated to all things Microsoft I routinely railed against the spying aspects of Windows 10. Well, apparently that’s nothing compared to what enterprise security, analytics, and hardware management tools are doing. An analytics firm called ExtraHop examined the networks of its customers and found that their security and analytic software […]
Every year, thousands of hackers arrive in Las Vegas for three large security conferences — DEF CON, Black Hat and Bsides Las Vegas — taking place from Monday through Sunday next week. CSO Online’s J.M. Porup chats with Juliet about what to expect at the conferences’ sessions and what he’s looking forward to.