Part 2 of this three-part security series focuses on new ways hackers can attack your company's network, such as the rise of the Internet of Things (IoT) and other technologies.
Everyone's Blog in Security
Part 1 of this three-part security series focuses on the foundations of network security ensuring your organization keeps customer and company data secure. The most pressing need is better detection.
For the distributed enterprise, emerging technology and tools are a blessing and a curse. They can benefit a company’s efficiency, but they also present additional security challenges at the Edge.
In this fourth part of the blog series, "How to Maximize Your Peak Selling Season," we will take a closer look at pop-up stores. Specifically, we’ll examine: why so many retail enterprises have made pop-up/mobile stores central to their corporate strategies and where consumers are likely to find them, and the unique problems pop-up stores pose to corporate IT departments.
In part three of this series, Wireless Wide Area Networks (WWAN) will be of focus as historically, retailers have struggled with justifying the cost of their store network—even for their own use. Just a few years ago it was a struggle for retailers to spend the money to provide free Internet to their customers.
Last fall, Cradlepoint CSO Kent Woodruff wrote a blog post about Adam Shostack’s theme for his opening address at 2014 BSidesLV. Shostack spoke at length about “information sharing as the ultimate act of self-preservation.” The exponential rise in criminal intrusions into public and private databases in the recent past has precipitated the creation of a number of information sharing organizations by both the private and public sectors.
Last year enterprise security experts discovered that, once hackers are able to break into less protected monolithic network segments, they can quickly “pivot” to access segments that contain valuable information. The result has been catastrophic for some of the biggest names in retailing.
In part two of this blog series, we will discuss the specific threats branch offices face, and why Cradlepoint has joined Zscaler to defeat these threats.
For any company, the ability to securely connect to the Internet and corporate networks is an essential part of everyday business. Security is even more critical, and often much harder, when a company’s business is transacted through hundreds or thousands of branch offices or remote locations.
To protect the entire enterprise, management must make sure that their branch office staff members, as well as their customers, do nothing that might compromise overall security.
Last week the OpenSSL project released an advisory that describes a new SSL vulnerability. Now commonly known as “POODLE” ("Padding Oracle On Downgraded Legacy Encryption"), this vulnerability is less dangerous that its predecessor, the Heartbleed bug—primarily because of the conditions needed to exploit it (see below).
POODLE is essentially an attack on the SSLv3 protocol. It was discovered in September (and published on October 14) by Google employees Bodo Möller, Thai Duong, and Krzysztof Kotowicz.