Home Default HubSpot Blog

Blog

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

On Monday Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities described a set of scenarios where a malicious user can perform a man-in-the-middle replay attack on wireless users connected to the network using...

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

Cisco Live day three started with a security keynote with Cisco Chief Security & Trust Officer, John N. Stewart. Stewart opened with bold statements about IoT and today's digital transformation. He dove into many of the dilemma's IT teams today:

Continue reading

Only 46 days after the WannaCry ransomware attack began a new threat has emerged, and appears to be spreading quickly. "Researchers with multiple firms identified the ransomware as Petya, malware that makes computers inoperable by encrypting their hard drives and demands ransoms in exchange for a digital key to restore access." [Reuters] 

Continue reading

Today more and more businesses are focused on application security and visibility. With expected exponential growth in online devices - from 15B today to an expected 500B by 2030, securing those devices has never been more important. Today’s rapidly evolving business models reflect trends like hybrid cloud, mobility and BYOD, meaning the traditional network perimeter has largely dissolved. The...

Continue reading

As threats become more sophisticated, organizations are responding by introducing layers of security that go beyond just securing your internet edge and deploying anti-virus on the desktops. A big challenge with this approach is managing the often disparate systems that make up these layers. Cisco has made huge strides to correct this with their software releases this year, but in reality, it...

Continue reading

"On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser of Apache Struts could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability has been assigned CVE-ID CVE-2017-5638. " (Cisco Security Advisory) 

Continue reading

Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! In this chat we are discussing a topic that many of our customers are talking about this year: Security and Network Visibility. Sit back, relax, and enjoy another fireside chat. 

Continue reading