Malware to steal data from POS systems is widely available


On December 22, 2017, Jason’s Deli was notified by payment processors that credit card security personnel had informed it that a large quantity of payment card information had appeared for sale on the “dark web,” and that an analysis of the data indicated that at least a portion of the data may have come from various Jason’s Deli locations. From initial investigation findings, criminals deployed … Continue reading Malware to steal data from POS systems is widely available

Securing Container workloads for Enterprise


What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and private or public cloud Containers enable customers to simplify multi-tenancy … Continue reading Securing Container workloads for Enterprise

Open Source Hardware – its Cost Reduction for many enterprise business


Large enterprise, cloud service providers, ‘big brand’ product companies are spending millions or billions of dollars in building their data center. So what do you think keeping these companies technology imperatives moving forward. Are they going to focus on hybrid controllers, traffic shaping, 100G, network modeling, network analytics and simulation, circuit automation and testing, backbone and edge traffic engineering, passive and active monitoring, configuration automation … Continue reading Open Source Hardware – its Cost Reduction for many enterprise business

Microsoft – Fastest growing Cyber Security Company


Most often, cyber security professionals make fun of Microsoft products until few years ago. Its due to the reason that its been considered one of the  notoriously full of dangerous bugs, and Microsoft was considered difficult to work with when it came to patching them. For instance, the infamous Stuxnet worm, an attempt allegedly by USA spy agencies , to take down Iran’s nuclear facilities … Continue reading Microsoft – Fastest growing Cyber Security Company

Telecom operators seek to solve security problems of the future


As Internet of Things (IoT)-enabled products and services like smart televisions and smart homes begin to enter the market, many consumers are becoming worried that these devices will make them vulnerable to hackers who want to steal personal information – or worse. One fear involves the manipulation of rapidly evolving smart car technologies. Some worry that in a future where driving is automated, a hacker … Continue reading Telecom operators seek to solve security problems of the future

Security still top of enterprise agenda as execs seek to stay out of jail


Cybersecurity will become more important than ever for enterprise CIOs in 2015 as top executives work hard to avoid damage to brands and balance sheets, and to minimise their own personal risks, according to Verizon. The telco this week published its enterprise technology trends predictions for the coming year, including security among the top five. Specifically, the U.S. operator noted that enterprises seeking to guard … Continue reading Security still top of enterprise agenda as execs seek to stay out of jail

Palo Alto Firewall Migration


What to look out for? You should be conscious in understanding the TO-BE network security topology & ensure the required assets (additional switches, cables, etc) and get ready with the solutions & logical diagram Most importantly, have skilled resources to perform the task. If the present employees are not master in PA. Please provide them training and ensure they complete certification (at least ACE) If your end-objective is … Continue reading Palo Alto Firewall Migration