The Domain Name System remains under constant attack, and there seems to be no end in sight as threats grow increasingly sophisticated. DNS, known as the internet’s phonebook, is part of the global internet infrastructure that translates between familiar names and the numbers computers need to access a website or send an email. While DNS […]
Bank-grade security, super-fast transactions, and analytics If you live in Asia or have ever traveled there, you’ve probably witnessed the dramatic impact that mobile technology has had on all aspects of day to day life. In Hong Kong in particular, most consumers now use a smart phone daily, presenting new opportunities for organizations to deliver […]
Cross OS Integration with FSLogix to be demonstrated on booth #1504 FlexApp Application Layering solution of choice for WVD Liquidware, the leader in adaptive workspace management, today announced the latest version of its award winning ProfileUnity with FlexApp v6.8.3 that delivers new features including official FlexApp application layering support for Microsoft Windows Virtual Desktop (WVD) […]
Use these techniques to inventory your network to determine which devices have BitLocker.
Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet discusses the implications of this fine — and how Facebook may (or may not) change its practices.
This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.
The TCP/IP protocol is the foundation of the internet and pretty much every single network out there. The protocol was designed 45 years ago and was originally only created for connectivity. There’s nothing in the protocol for security, mobility, or trusted authentication. The fundamental problem with TCP/IP is that the IP address within the protocol […]
Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10. The two worst problems involve Cisco Data Center Network Manager (DCNM). Cisco DNA Center controls access through policies using Software-Defined Access, automatically provision through Cisco DNA Automation, virtualize devices through […]
I’m excited to announce our second Azure Blueprint for an important compliance standard with the release of the PCI-DSS v3.2.1 blueprint. The new blueprint maps a core set of policies for Payment Card Industry (PCI) Data Security Standards (DSS) compliance to any Azure deployed architecture, allowing businesses such as retailers to quickly create new environments […]