Real life consequences of cyberattacks: the exception, or soon to become the norm?

Thursday 14 September 2017

If you ask the typical businessperson to tell you about the impact of cyberattacks, you’ll probably get a stock answer. They’ll talk about the massive inconvenience and downtime caused when a virus hits their computers. Or mention the need to ask and pay for an expert to clean it up. Another concern might be the possibility that critical data might be lost, or at least corrupted in some way. Or perhaps there will be a nagging worry that commercially sensitive information has fallen into the wrong hands. 

Read more

BeyondCorp: Enrolling Users and Endpoints

Tuesday 12 September 2017

Enrollment usually involves a combination of inventory, inspection and verification. You create a list of entities to be entered into the system that you’ll use to authenticate them and grant them access (in this case, a list of authorized users and a list of endpoints they’re using). You can use bulk enrollment — that is, you can use the list to create entries for each one without your users having to do anything — or you can use self-enrollment, where the users make contact and supply shared data so that you can recognize them.

Read more

Ixia to Showcase Advanced Security and Visibility Solutions at IP Expo Europe 2017

Wednesday 06 September 2017

06 September, 2017— Ixia, a leading provider of network test, visibility, and security solutions, will be demonstrating a wide range of technology advancements and interoperability at IP Expo Europe at London ExCel, 4 – 5 October.

Read more