article thumbnail

Video: How an IoT firewall can protect your smart office from cyber-attacks

Tech Republic Security

Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware.

Firewall 315
article thumbnail

BackBox adds network vulnerability management to automation platform

Network World

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.

Network 364
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. Matt Hoag, CTO of business solutions, Koch Industries Koch Industries. Koch’s partnership with Alkira has also enabled the CTO to build up his team’s cloud networking skills.

CTO 243
article thumbnail

Cisco shows off new AI features to secure data flows

Network World

And Cisco Live wouldn’t feel like a Cisco event without at least one firewall announcement and sure enough, the company is promoting its new Firewall 1200 Series to address the problem of networking hardware sprawl making SD-WAN harder to implement than it should be.

Security 436
article thumbnail

5 dead-end IT skills — and how to avoid becoming obsolete

CIO Business Intelligence

Vaclav Vincalek, CTO and founder at 555vCTO, points to Google’s use of software-defined networking to interconnect its global data centers. Maintaining network devices like routers, switches, and firewalls by hand are examples.” In software development today, automated testing is already well established and accelerating.

How To 321
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO Business Intelligence

Users are no longer mostly in the office, as remote work is widely accepted. Not all that long ago, it was common for enterprises to rely on signature-based detection for malware, static firewall rules for network traffic and access control lists (ACLs) to define security policies. Even if only 0.1%

Malware 363
article thumbnail

Kicking the Tires: Verisign DNS Firewall

CTOvision

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Verisign has leveraged its industry leading DNS capabilities and unmatched technical ability in the DNS arena to develop the Verisign DNS Firewall offering.

Firewall 150