AT&T touts virtualization, automation for enterprise 5G security

Fiercewireless | November 12, 2019

While awareness of 5G-related cybersecurity risks is high among enterprises, more needs to be done to prepare, according to a new report from AT&T’s cybersecurity unit, which suggested implementing tools like virtualization and automation. In AT&T’s most recent Cybersecurity Insights Report, based on a survey by 451 Research, nearly three-quarters of respondents indicated medium-high or high level of concern in terms of the potential impact of 5G on security and 76% expect brand-new security threats to emerge from 5G. The communications market was most concerned, with 54% expecting 5G to have a very significant impact on the network that might require a new security stack or an entirely new set of processes, compared with 42% of respondents overall.

Spotlight

The proper use of cloud computing technology is not something you can ¬nd in a book. There is a bit of trial and error to the process, and you have to be willing to build this experimentation into your cloud implementation and migration processes


Other News
VIRTUAL DESKTOP STRATEGIES

Pentera Finds Two Zero-Day Vulnerabilities in VMWare vCenter, Exposing More Than 500,000 Companies Globally

Pentera | April 04, 2022

Pentera, the leader in Automated Security Validation (ASV), today announced its Pentera Labs team discovered two zero-day vulnerabilities. If exploited by threat actors, the critical attack path may result in the ability to disable, disrupt and destroy VMware vCenter managed environments in over 500,000 organizations globally. The vulnerabilities were reported to VMware by Senior Security Researcher Yuval Lazar and released under CVE-2022-22948 and CVE-2021-22015 with a patch. Pentera Labs’ technical review of the vulnerabilities can be found here. Discovered vulnerabilities require immediate patching to prevent malicious actors from achieving remote access to vCenter and inflicting widespread damage on organizations. Installed in thousands of organizations worldwide and managing some of their most critical asset and core systems, VMware vCenter Servers are a high-priority target for cybercriminals. Once compromised, the ease and convenience that vCenter offers for managing virtualized hosts in enterprise environments will play into the adversary’s hands, providing centralized access and widespread Impact. “As part of our daily work, we research the entire enterprise IT attack surfaces, including the exploitability of virtual workload environments such as vCenter and ESXi and discovered zero-day vulnerabilities,” said Alex Spivakovsky, VP of Research at Pentera. “We’re glad to have discovered and immediately disclosed these vulnerabilities to strengthen the defender community and have not seen evidence that malicious actors exploited it at this time.” Pentera’s interest in VMWare’s vCenter started because of previously reported vulnerabilities, increasing demand from customers and threats observed in the wild, most notably recent reports of a python ransomware strain targeting ESXi. The team will continue to identify potential vulnerabilities within the platform that could affect businesses globally. Security readiness is not determined by a single vulnerability or the security team’s ability to discover and patch it. Our award-winning security validation platform autonomously emulates the entire cyberattack kill chain and provides peace of mind for security leaders facing a multitude of internal and external attacks.” Pentera co-founder and CTO, Dr. Arik Liberzon About Pentera Pentera is the category leader for Automated Security Validation, allowing every organization to easily test the integrity of all cybersecurity layers, unfolding accurate, current security exposures at any moment, at any scale. Thousands of security professionals and service providers worldwide use Pentera to guide remediation and close security gaps before they are exploited.

Read More

VIRTUAL DESKTOP TOOLS

GoodAccess Offers Protection Against Online Threats With its Built-in Threat Blocker Feature

GoodAccess | March 09, 2022

GoodAccess, an anytime-anywhere zero-trust remote access company, has added the Threat Blocker feature to its platform. Threat Blocker enables businesses to provide network security on the public internet and protect remote employees from dangerous domains, phishing attempts, malware and network attacks. Threat Blocker is a native feature of the GoodAccess platform and is automatically enabled for all customers with no additional setup required. It uses several threat intelligence feeds to identify and block connections with malicious domains in real-time (so-called DNS filtering). The feeds are constantly updated with the latest information on malicious domains, so businesses can be confident that their employees are protected from the newest threats. Threat Blocker is an important addition to the security features of our platform. When phishing, ransomware, and other online adversary techniques are still at large, GoodAccess Threat Blocker will help businesses to elevate their security posture against them and reduce the attack surface introduced by remote work." Artur Kane, CMO at GoodAccess For monitoring and compliance reasons, employees' access to harmful websites and content is tracked and logged. Also, GoodAccess users can define their custom domain blacklists (denylists) to strengthen their security controls. The new feature helps businesses to: prevent employees from accessing malicious websites and keep their data safe and secure, block malware before infiltrating business network and launching larger attacks (advanced persistent threats, APT), detect and block connections with C&C botnet networks, prevent ransomware attacks to keep data safe and systems up and running, prevent unauthorized access to the business network as a result of successful phishing and identity theft, reduce the risk of sensitive business data exposure. GoodAcces cloud VPN with zero-trust network access controls streamlines the way organizations handle remote networking and mitigates security risks introduced by distributed workforce, constant mobility and decentralized IT. Since 2020, GoodAccess has earned the trust of more than 1000 business customers from 120 countries worldwide.

Read More

VIRTUAL DESKTOP TOOLS

Flexxible IT and xFusion Partner to Enable a More Affordable Hybrid Workspaces in the Enterprise

Flexxible I | June 18, 2022

Flexxible IT, the global leader of Desktop as a Service (DaaS) delivery and services, and xFusion Europe, a global provider of computing power infrastructure and services, are announcing today a strategic alliance in the European market. Flexxible IT and xFusion can deliver a fully redundant hardware-based hybrid workspace environment built on any end-user compute (EUC) vendor that includes an all-inclusive, pay monthly, fully managed hybrid infrastructure solution. Flexxible IT combines its deep technical expertise, global industry knowledge, and best-in-class technology to deliver comprehensive and differentiated hybrid solutions. Partnering with xFusion furthers and supports Flexxible IT's focus on providing hybrid workspace solutions based on xFusion's hardware offering a fast, simple way to deploy, analyze, automate, monitor, and manage hybrid workspaces in a multi-cloud scenario. "Flexxible IT has been a leader in the DaaS space since 2008, and we are excited to partner with xFusion to enable this use case further," said Sebastian Prat, CEO, and Founder of Flexxible IT. "Our strategic relationship presents a cost-effective hybrid workspace solution to the market to enable customers to work from anywhere, with the best end-user experience and security." "At xFusion, we strive to enable any digital transformation use case with our industry-leading compute and services, Combining xFusion's first-class hardware and Flexxible IT's outstanding technology stack and superb experience, we provide an affordable hybrid workspace solution perfect for any enterprise's end-user compute requirements." Qin Feng, CEO of xFusion About Flexxible IT Flexxible IT is the future of hybrid working, where on-premises and cloud computing converge to enable virtual desktops and applications to run from anywhere. Flexxible IT has more than 700,000 managed users and is the leading DaaS Solution in Spain. For more information, visit www.flexxible.com. About xFusion xFusion is a leading global provider of computing power infrastructure and services. xFusion serves customers in 130 countries and regions, including 211 Fortune 500 companies, covering finance, carriers, Internet, transportation, and energy industries.

Read More

VMWARE

Defense Information Systems Agency Releases VMware NSX® Security Technical Implementation Guide

VMware Inc. | April 28, 2022

VMware Inc. (NYSE: VMW) today announced that the Defense Information Systems Agency (DISA) has added the Security Technical Implementation Guide (STIG) for VMware NSX® to the Department of Defense (DoD) Cyber Exchange. The updated DISA STIG outlines the installation requirements, security policies and controls for deploying VMware NSX within the Department of Defense and other federal agencies. The STIG will also help provide a vetted, more secure baseline for non-DoD entities to measure their security posture. Across the public sector, agencies are navigating accelerated innovation alongside the journey to Zero Trust security. As the threat landscape evolves, the release of DISA's STIG for VMware NSX will empower agencies to leverage VMware's advanced network virtualization and security platform to better protect and manage their multi-cloud environments. With VMware NSX, we are helping customers modernize their cloud networks to deliver apps faster while also protecting against today’s threats.” Jennifer Chronis, vice president, public sector, VMware. The STIG requirements confirm VMware NSX implementation is consistent with DoD cybersecurity policies, standards, architectures, security controls and validation procedures, when applicable NIST SP 800-53 cybersecurity controls are applied to all systems and architectures. The DISA STIG for VMware NSX provides guidance on configuring various components of an NSX environment, including the NSX Manager, Gateway Router, Distributed Firewall, and Gateway Firewall. The latest version of NSX joins VMware vSphere and VMware vSAN for which DISA has previously released STIGs. To view the official STIG, visit the DoD Cyber Exchange Public website and view the STIG release memo for VMware NSX. Multi‑Cloud for Mission Success Earlier this month, VMware announced the findings of a study on how government agencies are scaling the use of multi-cloud environments. The study, titled “Multi-cloud Is The New Frontier Of Government IT," conducted by Forrester Consulting, found that while the move to multi-cloud is a priority, agencies face challenges in supporting growing cloud environments, including compliance standards, data security and upskilling employees.

Read More

Spotlight

The proper use of cloud computing technology is not something you can ¬nd in a book. There is a bit of trial and error to the process, and you have to be willing to build this experimentation into your cloud implementation and migration processes

Resources