Brand Post

About the Author Brand Post


BrandPost: Should Your Enterprise Perimeter Live in the Cloud?

As enterprises embrace cloud computing and a mobile workforce, IT leaders have watched the traditional network perimeter capabilities dissolve, making security, access and identity concerns a top priority.

Digital ecosystems have expanded the infrastructure horizon for enterprises far beyond the network perimeter. Increasingly applications reside in the cloud, erasing the traditional idea of “inside” and “outside” a network perimeter. And while the idea of a “cloud perimeter” is emerging, protecting data your enterprise in requires a new approach to security that moves from the “moat and castle” approach to a zero trust model.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: State of Remote Access Security

Nearly three-quarters of the U.S. workforce will be mobile workers by 2023, IDC predicts. With so many employees on the road at least part of the time, being able to access business critical applications remotely is key to the way we work — but also hard to secure.

In a recent study conducted by IDC for Akamai, more than half of respondents (56%) ranked security breaches as their greatest challenge around application access, even as they acknowledged that providing that level of access is an absolute necessity. Indeed, more than half the companies surveyed said every aspect of securing access is difficult, from managing mobile employees to onboarding and off-boarding contractors and partners.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: DNS: Early Warning System for Cyber Attacks

The Domain Name System (DNS) is akin to the central exchange for the Internet. It lists, tracks, and matches domain names – like www.akamai.com — to machine-readable IP addresses – like 23.199.214.34 — to steer traffic to the desired site.

But security wasn’t top of mind in the design of the DNS protocol. As such, it should come as no surprise that DNS-based threats continue to stalk the digital world. In fact, DNS is one of the top three most frequently used attack vectors to date this year, according to Akamai’s First Quarter, 2017 State of the Internet / Security Report.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: DNS and Security: A Vulnerability, Yes. But Also A Safeguard

Every action on the Internet relies on the Domain Name System (DNS), which lists, tracks, and matches domain names to machine-readable IP addresses to make sure traffic gets where it’s meant to go. Because it’s such a basic part of the Internet, many organizations take it for granted—and that’s made the world’s 30 to 50 million DNS servers an increasingly popular cyber attack vector.

A recursive DNS server’s only function is to resolve user requests. It has no way of knowing whether the connection it enables is good or bad. At many enterprises, firewalls do not inspect the port that DNS servers use to listen for queries. Often, the default firewall configuration is to allow inbound DNS requests from the public Internet so that a DNS service can respond.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The VPN is Dead; Long Live the VPN!

For years, virtual private networks (VPNs) have been the best practice for giving remote workers secure access to corporate data and applications. But VPNs are built on the fundamental idea that enterprises have an inside and an outside—and the more operations your organization moves to the cloud and the more your users are accessing things remotely, the more difficult it’s becoming to define what “inside” and “outside” even mean.

How do you provide secure access to your enterprise network when it’s effectively scattered across the Internet?

A recent IDC survey indicates this concern is weighing on companies in every industry. More than 80% of the companies surveyed feel providing remote access is important, and most expect their use of remote access will grow by 11% to 20% in the next year or two.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

BrandPost: The VPN is Dead; Long Live the VPN!

For years, virtual private networks (VPNs) have been the best practice for giving remote workers secure access to corporate data and applications. But VPNs are built on the fundamental idea that enterprises have an inside and an outside—and the more operations your organization moves to the cloud and the more your users are accessing things remotely, the more difficult it’s becoming to define what “inside” and “outside” even mean.

How do you provide secure access to your enterprise network when it’s effectively scattered across the Internet?

A recent IDC survey indicates this concern is weighing on companies in every industry. More than 80% of the companies surveyed feel providing remote access is important, and most expect their use of remote access will grow by 11% to 20% in the next year or two.

To read this article in full or to leave a comment, please click here

Read more 0 Comments