Remove Authentication Remove Examples Remove Security
article thumbnail

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Network 210
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Then some very positive things started happening.

Security 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to deploy WPA3 for enhanced wireless security

Network World

WPA3 is the latest iteration of the Wi-Fi Protected Access (WPA) standard, succeeding WPA2, which has been the de facto security protocol for wireless networks for nearly two decades. This new standard addresses the security vulnerabilities inherent in WPA2, while adding some brand-new security functionality. authentication.

Wireless 187
article thumbnail

CIOs Want To Know: How Secure Is Your Mobile Phone?

The Accidental Successful CIO

What should you be doing as CIO to keep your people and your company secure? I have an excellent example for you to ponder. Should mobile phone users be concerned about relying on their mobile phones for text messaging based two-factor authentication? More security means more friction.

Mobile 246
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Zero Trust architecture was created to solve the limitations of legacy security architectures. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures. Security requires an adaptive model that understands the fluidity and dynamism of the modern digital landscape.

Firewall 158
article thumbnail

Identity and Access Management: Hot or Not?

CTOvision

Stated another way, cloud applications have their own password policies, which means traditional LDAP authentication with the Active Directory becomes considerably more complex in it set up. With single sign-on (SSO), end-users only have to authenticate themselves once, entering a username and password from the Active Directory.

article thumbnail

Adding Security Keys to Your Authentication Toolbox

SecureWorld News

I have always known about physical security keys, also called hard tokens, but never actually used one despite my curiosity. So, I was kind of excited when I got my hands on two cool things: a YubiKey 5 and a Google Titan security key. The platforms I tested with these two security keys are Microsoft 365 (M365), Google, and Twitter.