The long-debated QUIC protocol is getting serious attention these days. It has been in development since 2012, but is all the rage now because HTTP/3 (the main reason QUIC was designed in the first place) is now an official standard.
What is it, then, and what might it mean for security? Let's find out.
Security doesn't have to be a massive financial hardship. In fact, there are a great number of things that can be done in your organization to make systems and applications more secure. This post outlines some of the most helpful that can be used to make your organization more secure.
Not all security needs to come with a price tag, and organizations shouldn't give up on becoming more secure because of cost concerns. A lot of security comes down to education, mindset, and taking advantage of the security built into products and technologies that you already own.
A Password Manager is an essential security feature for individual users and enterprises alike. The average internet denizen has to remember 70-80 passwords and accounts, and using the same few passwords over and over is very insecure. Now add in enterprises, who need to secure more than just passwords alone.
Microsoft presented their modern security vision this past week at Gestalt IT’s Security Field Day 7. They highlighted the importance of interconnectedness as a security practice as part of their “SIEM+XDM” security vision. The technology is compelling, but questions about manageability (and cost) remain.
Security conversations often revolve around outwardly-facing edge technologies like firewalls and IDS. These help harden the shell against external threats, but internal threats are just as dangerous. Data is what attackers want, which is why it's just as important to be vigilant about security inside the perimeter.
Constant technological progress means that IT Security is always evolving to keep up. The recent release of NIST SP 800-53a (rev 5) is a reminder of this. Staying current with security policy is tiring, but keeping up with it (and keeping ahead of the attacks that are evolving is just as fast) is essential.
The amount of unsecured internet-connected devices that are crawling around our homes (sometimes literally) has been on the rise for years. The latest Amazon Echo hack reminds us that these devices are powerful tools that cannot, and should not, be blindly trusted on our home networks.