The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Attend this...
Google is investigating an unorthodox routing of internet traffic that on Monday sent traffic bound for its cloud services instead to internet service providers in Nigeria, Russia and China. Security experts say border gateway protocol is to blame and no easy fix is in sight.
Hackers behind the FASTCash ATM cash-out attack campaign - tied by the U.S. government to North Korea - use Trojan code designed to exploit bank networks running outdated versions of IBM's AIX Unix operating system, Symantec warns.
The journey to modernization has its challenges, including an increase in events that are more difficult to monitor due to a diverse hybrid cloud/legacy infrastructure. Real-time IT monitoring tools lead to earlier detection and fewer critical events that could place an agency's mission at risk.
Download the...
One of the biggest challenges facing IT ops in agencies today is the lack of visibility across the entire infrastructure.
Download this report by Gartner to learn the four-step approach to developing an IT operations monitoring strategy.
The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report. But since that audit was conducted, the FDA has been aggressively ramping up its activities around device cybersecurity.
With so much focus on endpoint security, it's important not to overlook the importance of network-level security controls, says Lawrence Orans, research vice president at Gartner.
Many enterprises still rely on Microsoft Windows Server 2008 to run business critical applications. But Windows Server 2008 will reach End of Support on January 14, 2020, which means no more security and maintenance patches. Every enterprise has to face down this issue of legacy systems sooner or later. With Windows...
IT infrastructure monitoring has long been the foundation for managing systems and application performance, availability and reliability. Today, monitoring solutions are needed more than ever due to huge increases in infrastructure scale and complexity, growth in cloud architecture deployments, and demands for a...
Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that cannot operate in real time, says Matthew Moynahan, CEO at Forcepoint.
Much more must be done to shore up the U.K.'s national infrastructure. "It's partly austerity, and it's partly what's happening in the global economy, but we've really seen an underinvestment, specifically in the critical national infrastructure," says LogRhythm's Ross Brewer.
Old technology never dies, but rather fades "very slowly" away, as evidenced by there being 21 million FTP servers still in use, says Rapid7's Tod Beardsley. Rapid7's scans of the internet have also revealed a worrying number of internet-exposed databases, memcached servers and poorly secured VoIP devices.
Many models of security have their roots in older infrastructure. But older models don't fit the needs of modern businesses, and with the death of the network perimeter and the rapidly approaching end to passwords, we need security that will enable us now and into the future - especially with new devices coming in...
An attack spoofed internet routing information, resulting in anyone who visited MyEtherWallet.com - a free, open source web app for storing and sending ether-based tokens - instead being routed to an attacker-controlled site, leading to an estimated $320,000 in losses.
With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.