Rebasoft’s ‘Four Pillars of Network Security’ series: Part 2 – Behaviour Monitoring

May 31st, 2017 Posted by Security 0 thoughts on “Rebasoft’s ‘Four Pillars of Network Security’ series: Part 2 – Behaviour Monitoring”

All you have to do is read the headlines to know that the conventional approach to IT security is failing. The rising number of security incidents globally reached 1,792 with nearly 1.4bn data records being compromised and billions of dollars lost along with reputations irreparable damaged. That is a year on year rise of 86 per cent and a clear indication that that the criminals are winning the cyber security war and organization’s need to change their approach.

(more…)

Rebasoft’s ‘Four Pillars of Network Security’ series: Part 1 – Network Visibility

May 12th, 2017 Posted by Security 0 thoughts on “Rebasoft’s ‘Four Pillars of Network Security’ series: Part 1 – Network Visibility”

For years, the security industry has debated whether outsiders or insiders pose the biggest risk to your network. Today, this argument has become moot as the network demarcation boundaries have been blurred and the threats are all around us.

(more…)

Network Access Control based security is dead without the capability for device fingerprinting

April 28th, 2017 Posted by Security 0 thoughts on “Network Access Control based security is dead without the capability for device fingerprinting”

Despite a growing media concern, many organisations continue to underestimate the potential security issues lurking in IP enabled ‘dumb devices’ such as printers, CCTV cameras, smart meters or even TVs. In this blog we would like to explain how the ability to ‘fingerprint’ devices as part of a Network Access Control (NAC) security solution – is vital for identifying and monitoring these new devices on our networks.

(more…)

CIA failure has exposed the security vulnerability of IoT devices

March 29th, 2017 Posted by Security 0 thoughts on “CIA failure has exposed the security vulnerability of IoT devices”

The revelation by WikiLeaks that the CIA ‘lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation’ once again brings cyber security and defending yourself against attacks to the fore.

(more…)

Is there a security threat hiding behind your printer?

March 28th, 2017 Posted by Security 0 thoughts on “Is there a security threat hiding behind your printer?”

It seems common that the feedback we hear from those who have attempted the mammoth task of deploying NAC is ‘Nightmare’ or ‘given up’. Why should controlling your own network and connected assets be so difficult? There are a few reasons that immediately spring to mind, BYOD (or if we go large the Internet of Things) and the traditionally intrusive nature of the NAC beast and the inability of a number of network connected devices to use agents making them difficult to verify.

(more…)

Trust is a fundamental aspect of network security, but how can we guarantee it?

March 28th, 2017 Posted by Security 0 thoughts on “Trust is a fundamental aspect of network security, but how can we guarantee it?”

Good network security is about being able to say you trust the systems that access your network and the applications within it. This level of security, for any organization, is a serious undertaking and, like an insurance premium, a necessary item on the list of things that have to be assessed and prioritised.

(more…)

Follow us

   

Headquarters
21 London Road
Twyford
United Kingdom
RG10 9EH
+44 (0) 800 779 7322
Corporate
© Copyright 2017 Rebasoft Ltd.
Registered in England & Wales: 06914233