Remove Authentication Remove Network Remove Transportation
article thumbnail

Alkira expands NaaS platform with ZTNA capabilities

Network World

Alkira is expanding its namesake network-as-a-service ( NaaS ) platform with new zero trust network access ( ZTNA ) capabilities. Alkira provides a SaaS service for on-demand network infrastructure. The company was founded in 2018 by former Cisco employees who had previously founded SD-WAN vendor Viptella.

Network 417
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. The traditional reliance on firewalls and VPNs for cybersecurity is proving inadequate in the face of mounting cyberthreats and changes to network designs due to the cloud.

Firewall 396
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finding purpose at the intersection of tech and transport

CIO Business Intelligence

Transport for New South Wales was first established in 2011, and since then, the culture of putting customers and communities at the center of everything, and partnering with operational agencies, private operators, and industry to deliver passenger focus services and projects, has been a constant.

article thumbnail

Networking terms and definitions

Network World

To find a brief definition of the networking term you are looking for user your browser’s “Find” feature then follow links to a fuller explanation. AI networking AI networking refers to the application of artificial intelligence (AI) technologies to network management and optimization.

Network 435
article thumbnail

AI brings complexity to cybersecurity and fraud

CIO Business Intelligence

We also employ adaptive authentication, such as liveness detection, contextual MFA, and real-time identity challenges, to thwart impersonation attempts. Additionally, we have AI-powered voice & video authentication and adaptive phishing detection models being planned for future implementation.

Security 263
article thumbnail

IDG Contributor Network: IoT security: Intel EPID simplifies authentication of IoT devices

Network World

Or that the Transport Security Administration (TSA) screens over 2 million people daily? How can the authentication and installation of new IoT devices be streamlined? Did you know that over 75 million tourists visit the United States every year? The TSA processes 150 passengers per security lane.

article thumbnail

6 key mobile and IoT/OT attack trend findings

Network World

Meanwhile, OT and cyber-physical systems, once air-gapped and isolated from the internet, have rapidly become integrated into enterprise networks, where threats can proliferate. This should include isolating and fully segmenting agentless IoT/OT devices into a secure “network of one,” including legacy servers and headless machines.

Mobile 418