WAN Security Channel
Blogs
Hacking Everything
September 01, 2011 08:58 AM
Posted by Lee H. Badman
Here’s a puzzle for you: What do a new Dodge Ram pickup truck, a digital road sign, a young English lady’s cell phone and a modern lighting control system have in common? They’re not all necessarily made in the same Third World country, if that’s what you’re thinking. But they are all exploitable by virtue of their network connectivity, and the implications can be quite worrisome.
See all blogs by Lee H. Badman
Black Hat Will Once Again Show Our Security Weaknesses
August 01, 2011 11:15 AM
Posted by Jim Rapoza
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.
See all blogs by Jim Rapoza
Don't Get Snagged By Spear Phishers
July 12, 2011 07:00 AM
Posted by Jim Rapoza
For one growing security concern, basic security systems and good user awareness may not be enough to keep users and businesses protected. In some of the recent cases of spear phishing, even trained security personnel were tricked into surrendering personal data or infecting systems with malware.
See all blogs by Jim Rapoza
No Data Privacy In The Cloud
July 01, 2011 11:08 AM
Posted by Jim Rapoza
Most people understand that data in the cloud won’t have the same level of security and privacy that data inside your corporate firewall has. But some recent news has shown just how insecure your cloud-based data really is.
See all blogs by Jim Rapoza
Enterprise Social Networks And Security Risks
June 28, 2011 07:00 AM
Posted by Jim Rapoza
While attending UBM TechWeb's Enterprise 2.0 Conference in Boston last week, I heard lots of conversations about the benefits and potential pitfalls of enterprise social networking. One theme that I heard repeated more than a few times was that enterprise social networks can create a greater security risk.
See all blogs by Jim Rapoza
Securing What You Don't Own
June 21, 2011 07:00 AM
Posted by Jim Rapoza
What do you do when the laptops, smartphones and tablets accessing company resources are owned by employees? You may find that traditional methods of security and management will be much harder to implement.
See all blogs by Jim Rapoza
Best of the Web
VXLAN termination on physical devices
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
ONF Deadly Serious About OpenFlow-Based SDNs
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Practical Introduction to Applied OpenFlow
Get a primer on the Openflow protocol and what it can do for networking.
On Resilience of Spit-Architecture Networks
This research papers investigates the practical issues in split-architecture networks and the placement of the controllers, such as Openflow controllers, in the network.












