Home LookingPoint Blog

Blog

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

On Monday Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities described a set of scenarios where a malicious user can perform a man-in-the-middle replay attack on wireless users connected to the network using...

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

Cisco Live day three started with a security keynote with Cisco Chief Security & Trust Officer, John N. Stewart. Stewart opened with bold statements about IoT and today's digital transformation. He dove into many of the dilemma's IT teams today:

Continue reading
Continue reading

Today more and more businesses are focused on application security and visibility. With expected exponential growth in online devices - from 15B today to an expected 500B by 2030, securing those devices has never been more important. Today’s rapidly evolving business models reflect trends like hybrid cloud, mobility and BYOD, meaning the traditional network perimeter has largely dissolved. The...

Continue reading

As threats become more sophisticated, organizations are responding by introducing layers of security that go beyond just securing your internet edge and deploying anti-virus on the desktops. A big challenge with this approach is managing the often disparate systems that make up these layers. Cisco has made huge strides to correct this with their software releases this year, but in reality, it...

Continue reading

"On March 6, 2017, Apache disclosed a vulnerability in the Jakarta multipart parser of Apache Struts could allow an unauthenticated, remote attacker to execute arbitrary code on an affected system. This vulnerability has been assigned CVE-ID CVE-2017-5638. " (Cisco Security Advisory) 

Continue reading

Welcome back to another recap of LookingPoint Fireside Chat, where we bring casual yet insightful conversations on modern IT solutions. In this episode, CEO Sean Barr is joined by Marshall Hill, Solutions Architect at LookingPoint, to talk about a critical topic that’s top-of-mind for every IT leader: Security.

Continue reading

Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets