Uncategorized

What the TLStorm 2.0 Flaws Mean for Network Security

tlstorm 2.0

In early May, critical vulnerabilities were discovered in the implementation of TLS communications in Aruba and Avaya switches. The security flaws, known as TLStorm 2.0, were found within the NanoSSL library and have created an opportunity for a ‘perfect storm’ for enterprises and MSPs relying on these switches within their networks. These flaws originate from What the TLStorm 2.0 Flaws Mean for Network Security

Finding Purpose through Corporate Giving

As a company, how often do you feel like your contribution to society or the communities you call home is “enough?” It’s an important question, and it’s a common one. But in truth, the…

BackBox Joins Cisco Security Technology Alliance (CSTA)

BackBox is excited to announce that it has joined the Cisco Security Technology Alliance (CSTA) as a new industry partner. Cisco Security Technology Alliance (CSTA) is focused on enabling product integrations that deliver easier and better security in multi-vendor deployments. BackBox provides automation for a wide range of security and network products from Cisco, starting BackBox Joins Cisco Security Technology Alliance (CSTA)

How Can Organizations Best Go About Disaster Recovery Planning in 2020?

A disaster recovery plan is a document that protects an organization from the effects of unforeseen catastrophes. It is a major part of any company’s business continuity plan, focusing mainly on its IT infrastructure and system when a calamity affects the business’s function. Be it a natural disaster, cyberattack, or power outage, a disaster recovery How Can Organizations Best Go About Disaster Recovery Planning in 2020?

Organizations Aren’t Confident About Their Network Security. Here’s What They Can Do About It.

As and when a company grows, the amount of data they handle on a daily basis goes up as well. This information can be either customer or employee centric or even sensitive details of the company. With a majority of businesses handling their data on a desktop connected to Wi-Fi or Wireless LAN, it’s important Organizations Aren’t Confident About Their Network Security. Here’s What They Can Do About It.