Entries by Tom Cross

Together, OPAQ & Palo Alto Networks are raising the bar for small and medium-sized businesses

Small and medium-sized businesses face a unique set of challenges protecting their networks from attack. Beyond the constraints of budget and the availability of talented people, many of the best security tools & technologies are designed with large enterprises in mind. They are often architected for large footprint deployments and packaged in way that places […]

SMS Hijacking: What do Midsize Enterprises Need to Know?

The security world has been buzzing recently about attacks that target text message-based multi-factor authentication (MFA) systems. In mid-July an article in Motherboard detailed the criminal underworld that has formed around the lucrative practice, which can be used to compromise consumers’ online banking accounts, steal bitcoins, and hijack popular social media accounts. On August 1st Reddit […]

What is a Next-Gen Host-Based Firewall and why would anybody care?

Host-Based Firewalls are a simple technology that is generally used to prevent unwanted inbound traffic by port number. They don’t play a significant role in most enterprise security programs because its too much work to manage policies for each individual host. Instead, organizations prefer to enforce policies with network firewall devices that can protect large […]

Drawing a New Map of Enterprise Networking

Earlier this year I got to hear Tim O’Reilly speak at Grand Central Tech as part of their Authors @ GCT lecture series. Mr. O’Reilly is out promoting his new book, “WTF? What’s the Future and Why It’s Up To Us.” One of themes of his book is the process of innovation – how we […]

Simplified Microsegmentation — From the Cloud

It is time to change the way that organizations approach network segmentation. In the past few years we have seen a mounting collection of threats target the wide open nature of most organizations’ internal computer networks. Although security pros have been harping on this for some time, most networks remain crunchy on the outside and […]

What You Need to Do – Major Wifi Encryption Vulnerability

The vulnerability: A set of significant vulnerabilities have been disclosed in the encryption of Wifi networks (specifically the WPA2 protocol). An attacker who is within range to connect to a Wifi network can exploit these vulnerabilities to completely decrypt traffic as well as manipulate or inject data. These vulnerabilities impact nearly every vendor of Wifi […]

A Bigger Scope Means A Bigger Mission

Today, I am excited to announce that Drawbridge Networks is officially part of the OPAQ Networks team! When we started Drawbridge Networks, we had a very clear mission of empowering companies to understand and defend their networks better than attackers. This was not an easy thing to tackle and required thinking outside of the box […]