Remove Authentication Remove Network Remove Report
article thumbnail

Counterfeit Cisco switches raise network security alarms

Network World

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a report from F-Secure.

Network 210
article thumbnail

Nile unwraps NaaS security features for enterprise customers

Network World

Network-as-a-service startup Nile has added new zero-trust capabilities and tapped Microsoft and Palo Alto Networks to bolster its enterprise security services. The new security features include built-in access control for basic authentication, single sign-on (SSO), and multi-factor authentication (MFA).

Security 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Multi-Factor Authentication is Key to Modern Cybersecurity

CIO Business Intelligence

Multi-factor authentication, or MFA. Multi-factor authentication requires users to provide two or more pieces of evidence in order to gain access to a network, application, or system, and can dramatically decrease the likelihood of infiltration. One of the best ways to ensure security? million to $4.24 It’s trusted, too.

article thumbnail

FCC proposes BGP security measures

Network World

The chairwoman of the US Federal Communications Commission has proposed that the FCC require large broadband service providers to submit confidential reports on their plans to manage security risks associated with their use of BGP. New solution to an old problem BGP is decades old. Exploits of BGP , too, have been around for years.

Security 192
article thumbnail

Managing the whole lifecycle for human and machine authentication

CIO Business Intelligence

In my last column for CIO.com , I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. . FIDO as an industry initiative was set up a decade ago to standardize the need for strong authentication/password technologies. Well, yes, but there is more that tech pros can do.

article thumbnail

Three reasons why your Zero Trust project isn’t delivering results (and what to do about it.)

Network World

Zero Trust Network Access (ZTNA) is relatively easy to understand as a cybersecurity concept. Forrester Research reports that 63% of network security leaders say their firm is struggling to operationalize Zero Trust. And Alkira’s vertically integrated network stack enables Zero Trust without disrupting legacy infrastructure.

Network 147
article thumbnail

Technology News and Hot Topics

CTOvision

Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). The latest Palo Alto Networks VM-Series release provides organisations with the ability to realise the full agility and … Read more on Telecompaper (subscription). Upcoming Industry Events.

Dell 258