Categories
Printers

How consumer IoT devices can break your security

The Internet of Things was never conceived with the needs of enterprise security in mind. Then again, no one expected most of the world to leave their offices overnight and begin working from home.

But now, in a world where nearly 75 per cent of global enterprises expect at least some of their employees to continue working from home permanently, the potential threat of unsecured consumer IoT devices is taking on a whole new dimension.

“Almost everybody already had some remote access capability,” says Jon Green, vice president and chief security technologist at Aruba, a Hewlett Packard Enterprise company. “It was just that only a minority of employees were using it. Now, it’s the majority. So it didn’t fundamentally change architectures all that much, but volume got much, much higher.”

Categories
security

The fundamentals of security incident response—during a pandemic and beyond

Information security is a nonstop race between you and cybercriminals—and COVID-19 means more challenges for your organization and more opportunities for attackers.

We spoke with cybersecurity experts about the challenges a new remote workforce creates for organizations, how to respond to a cyber threat, and how the threats themselves are changing.

Categories
computing Printers Tech. Trends

Semiconductors

A semiconductor is a computer chip that serves as the brain of anything that’s computerized or uses radio waves. It handles complex thinking such as arithmetic and data storage that is integral to cell phones, tablets, kitchen gadgets, laptops, video game consoles and automobiles.

In vehicles, dozens of individual semiconductor chips are used to control everything from engine temperature to alert drivers of the need for an oil change. The types of chips produced by semiconductor companies can be categorized in two ways(As per the integrated circuits or functionality of the chip).

Usually, chips are categorized in terms of their functionality. However, they are sometimes divided into types according to the integrated circuits (ICs) used.

Categories
Printers

AR and VR: From gaming novelty to enterprise essential

Advances in hardware and software, infrastructure, and other technologies are driving greater use of virtual, augmented, and mixed realities for both work and play, laying the foundation for what experts call the human edge.

Augmented and virtual reality has been around for some time, but only more recently have they begun to push the boundaries of how we work and play. With the ever-evolving capabilities of our smartphones and advances in hardware and software, network infrastructure, and other technologies, AR and VR are at a tipping point, moving beyond gaming and entertainment toward mainstream use.

Categories
cloud computing

Six predictions for the future of the edge

The edge is going to change the way we interact with each other and the world.

Thanks to edge computing, the world is about to look much different.

Within a decade, the edge will boast more computing power—and produce far more data—than the cloud does today, says Lin Nease, HPE Fellow and chief technologist for IoT.

The edge is where the Internet of Things, artificial intelligence, and ultrafast 5G networks are converging. And that will change our lives dramatically over the next few years.

Here are six major trends we can expect to see over the coming decade.

Categories
security

Firewall Best practices to block ransomware

Ransomware continues to plague organizations, with over a third of companies surveyed across 30 countries revealing that they were hit by ransomware in the last year. 

Such attacks are ever-increasing in complexity and adversaries are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill: a global average of an eye-watering US$1.85M – more than double the cost reported last year.

Modern firewalls are highly effective at defending against these types of attacks, but they need to be given the chance to do their job. 

Let’s discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

Categories
cloud

5 ways to power your Business with Cloud Services.

Cloud Services
Cloud Services

If your company is like most growing organizations, you’re are always on the lookout for simpler, more cost-effective ways to run IT. 

You might have heard that more and more businesses are achieving those results by turning to as-a-service, pay-as-you-go approaches for IT infrastructure. 

But you might have assumed that it’s a move that works best for larger companies.

Categories
software

Open Source Software

Open Source Software

Open source software is code that is designed to be publicly accessible—anyone can see, modify, and distribute the code as they see fit.

Open source software is developed in a decentralized and collaborative way, relying on peer review and community production.

Open source software is often cheaper, more flexible, and has more longevity than its proprietary peers because it is developed by communities rather than a single author or company.

Categories
security

Web Application Firewalls

Web application firewalls help monitor, filter and protect web applications from malicious attacks and unwanted internet traffic, including bots, injection and application-layer denial of service (DoS).

The WAF will help you establish and manage rules for avoiding internet threats, includin  cross-site scripting (XSS), SQL injection file inclusions, SQL injection, brute force attacks etc.

Web application firewall are deployed to protect web-facing applications and collect access logs for compliance, and analytics.

Categories
security

DMZ Demilitarized Zone

In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger untrusted network, usually the Internet.

The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term “demilitarized zone”, an area between nation states in which military action is not permitted.

Most firewalls are network-level security devices, usually an appliance or an appliance in combination with network equipment. They are intended to provide a granular means of access control at a key point in a business network.