Remove Authentication Remove Infrastructure Remove Network Remove WAN
article thumbnail

CIO Confidential: What Keeps CIOs and IT Leaders Up at Night

CIO

To get to the heart of these pain points, we sat down with CIOs and IT leaders across industries to candidly discuss where they are in their digital transformation journeys, the emerging infrastructure technologies they’re using, and their biggest fears and pressures when it comes to the future of their business.

article thumbnail

Multiple Vulnerabilities Found in Citrix SD-WAN Center and SD-WAN Appliances

Tenable

Tenable Research has discovered multiple critical vulnerabilities in both Citrix SD-WAN Center and the SD-WAN appliance itself that could allow a remote, unauthenticated attacker to compromise the underlying operating systems of each. In the SD-WAN appliance, an unauthenticated SQL injection can be used to bypass authentication.

WAN 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modernizing Critical Infrastructure Requires Security Transformation

Palo Alto Networks

Critical Infrastructure Blog Series. It's only mid-year and already 2021 has proven to be a watershed year of attacks on critical infrastructure (CI). Leaders in these organizations need to pay attention to the security risk associated with the next wave of infrastructure that is being planned, or which may already be online.

article thumbnail

A Framework for Improving Internet Routing Security

CableLabs

Reliable and secure routing is essential for the connectivity of critical communications networks, ensuring that data packets reach their intended destinations without being intercepted, altered or dropped. Protecting IP networks by performing self-assessments and adhering to cybersecurity principles.

article thumbnail

Network Troubleshooting in Depth: A Complete Guide

Kentik

The Network is the Key. The network is down!” — I’m sure you heard that before. Despite your best efforts as a network engineer, network failures happen, and you have to fix them. Network troubleshooting becomes easier if your network is observable. Network Troubleshooting Defined.

Network 114
article thumbnail

Strategies for Managing Network Traffic from a Remote Workforce

Kentik

When more of the workforce shifts to working remotely, it puts new and different strains on the infrastructure across different parts of the network, especially where VPN gateways connect to the network edge. This could mean the users are saturating the internet connectivity or that they’ve saturated the LAN (or maybe WAN).

Network 69
article thumbnail

The Cable Security Experience

CableLabs

This has increased awareness that our broadband networks are critical – and they need to be secure. The cable industry has long focused on delivering best-in-class network security and we continue to innovate as we move on towards a 10G experience for subscribers. A Review of HFC and PON Architectures. There are many standards for PON.