Small and medium-sized businesses face a unique set of challenges protecting their networks from attack. Beyond the constraints of budget and the availability of talented people, many of the best security tools & technologies are designed with large enterprises in mind. They are often architected for large footprint deployments and packaged in way that places […]
About Tom Cross
This author has yet to write their bio.Meanwhile lets just say that we are proud Tom Cross contributed a whooping 8 entries.
Entries by Tom Cross
The security world has been buzzing recently about attacks that target text message-based multi-factor authentication (MFA) systems. In mid-July an article in Motherboard detailed the criminal underworld that has formed around the lucrative practice, which can be used to compromise consumers’ online banking accounts, steal bitcoins, and hijack popular social media accounts. On August 1st Reddit […]
Host-Based Firewalls are a simple technology that is generally used to prevent unwanted inbound traffic by port number. They don’t play a significant role in most enterprise security programs because its too much work to manage policies for each individual host. Instead, organizations prefer to enforce policies with network firewall devices that can protect large […]
Earlier this year I got to hear Tim O’Reilly speak at Grand Central Tech as part of their Authors @ GCT lecture series. Mr. O’Reilly is out promoting his new book, “WTF? What’s the Future and Why It’s Up To Us.” One of themes of his book is the process of innovation – how we […]
It is time to change the way that organizations approach network segmentation. In the past few years we have seen a mounting collection of threats target the wide open nature of most organizations’ internal computer networks. Although security pros have been harping on this for some time, most networks remain crunchy on the outside and […]
The vulnerability: A set of significant vulnerabilities have been disclosed in the encryption of Wifi networks (specifically the WPA2 protocol). An attacker who is within range to connect to a Wifi network can exploit these vulnerabilities to completely decrypt traffic as well as manipulate or inject data. These vulnerabilities impact nearly every vendor of Wifi […]
Organizations are completely safe from WanaCrypt0r if they are following operational best practices that were matured a decade ago, when worm outbreaks like this were more frequent. So, why did WanaCrypt0r cause so much chaos, including disabling hospital networks and automobile production facilities?
Today, I am excited to announce that Drawbridge Networks is officially part of the OPAQ Networks team! When we started Drawbridge Networks, we had a very clear mission of empowering companies to understand and defend their networks better than attackers. This was not an easy thing to tackle and required thinking outside of the box […]