Remove Authentication Remove Examples Remove Security
article thumbnail

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Network 208
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Then some very positive things started happening.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs Want To Know: How Secure Is Your Mobile Phone?

The Accidental Successful CIO

What should you be doing as CIO to keep your people and your company secure? I have an excellent example for you to ponder. Should mobile phone users be concerned about relying on their mobile phones for text messaging based two-factor authentication? More security means more friction.

Mobile 246
article thumbnail

How to deploy WPA3 for enhanced wireless security

Network World

WPA3 is the latest iteration of the Wi-Fi Protected Access (WPA) standard, succeeding WPA2, which has been the de facto security protocol for wireless networks for nearly two decades. This new standard addresses the security vulnerabilities inherent in WPA2, while adding some brand-new security functionality. authentication.

Wireless 174
article thumbnail

Identity and Access Management: Hot or Not?

CTOvision

Stated another way, cloud applications have their own password policies, which means traditional LDAP authentication with the Active Directory becomes considerably more complex in it set up. With single sign-on (SSO), end-users only have to authenticate themselves once, entering a username and password from the Active Directory.

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. Combined with Cloudera technology, it becomes a secure and powerful enterprise architecture.

Big Data 150
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Zero Trust architecture was created to solve the limitations of legacy security architectures. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures. Security requires an adaptive model that understands the fluidity and dynamism of the modern digital landscape.

Firewall 135