Check where you have IPv6 enabled
Posted: Thu Feb 06, 2025 4:41 am
Access audit: and ensure DNS and DHCP settings for IPv6 are consistent across your organization to reduce the risk of a DNS spoofing attack.
Asset Inventory: Find and discover IPv6-enabled devices in your environment. Identify security risks, automate mitigations, and accurately inventory devices to ensure compliance.
Security Rule Administration: Simplify the administration of IPv6 firewall rules and access control lists by automatically checking devices for critical compliance and remediating errors to bring settings up to standard, as well as maintaining and managing consistent security hygiene.
OS Updates: It is critical that devices are updated to support the most secure and current IPv6 version for your environment. Pre- and post-checks with automated reporting ensure that devices that are not in sync with the latest version are successfully updated.
IPv6 is gaining ground, and it’s time to incorporate it into your network management strategy, especially when it comes to managing network configuration and remediating vulnerabilities on network and IoT devices. The most effective and efficient way to protect your organization from the growth of malicious activity coming at you from other planes is through an automation platform that supports multiple dimensions. This includes the old IPv4 dimension, the new IPv6 dimension, and any other planes that may emerge, such as out-of-band networking for telemetry.
Striking a Balance: Knowing When AI Risk Is Worth It
16.11.2023
Forrester analysts assessed the pros and cons of implementing artificial intelligence in an organization, reports the InformationWeek portal.
AI has become a real gold rush in the last year as organizations begin to look for ways to implement the new technology. However, this comes with serious security concerns and other serious risks.
Is it worth taking on this task right now?
Forrester analysts Jeff Pollard and Allie Mellen think so. In cyprus mobile database talk at Forrester’s Security & Risk event in November, they made the case for adopting AI despite the risks because the benefits are too great to pass up.
“Yes, it brings new threats,” Pollard said. “Yes, it brings new risks. But it’s all necessary for new opportunities to emerge. AI will help your team solve some of the most important problems.”
Generative AI Lives Up to Expectations
Unlike the hype around the metaverse, which has yet to become a reality, the AI situation is a different story, Pollard said. “If you look at what’s happening with generative AI in particular, the catalysts are lined up. There’s a lot of money being spent on it. There’s a lot of beta testing. It can be done within existing software and technology stacks,” he said.
The speed of AI adoption is a big concern among CISOs, he says. “It’s happening so fast… and that scares a lot of CISOs. It scares a lot of legal functions, and rightfully so. Risk is a great word when it comes to new technologies. But when you start thinking about risk, I want you to replace it with another word. And that word is trade-off. Because trade-off is the everyday language of risk.”
Asset Inventory: Find and discover IPv6-enabled devices in your environment. Identify security risks, automate mitigations, and accurately inventory devices to ensure compliance.
Security Rule Administration: Simplify the administration of IPv6 firewall rules and access control lists by automatically checking devices for critical compliance and remediating errors to bring settings up to standard, as well as maintaining and managing consistent security hygiene.
OS Updates: It is critical that devices are updated to support the most secure and current IPv6 version for your environment. Pre- and post-checks with automated reporting ensure that devices that are not in sync with the latest version are successfully updated.
IPv6 is gaining ground, and it’s time to incorporate it into your network management strategy, especially when it comes to managing network configuration and remediating vulnerabilities on network and IoT devices. The most effective and efficient way to protect your organization from the growth of malicious activity coming at you from other planes is through an automation platform that supports multiple dimensions. This includes the old IPv4 dimension, the new IPv6 dimension, and any other planes that may emerge, such as out-of-band networking for telemetry.
Striking a Balance: Knowing When AI Risk Is Worth It
16.11.2023
Forrester analysts assessed the pros and cons of implementing artificial intelligence in an organization, reports the InformationWeek portal.
AI has become a real gold rush in the last year as organizations begin to look for ways to implement the new technology. However, this comes with serious security concerns and other serious risks.
Is it worth taking on this task right now?
Forrester analysts Jeff Pollard and Allie Mellen think so. In cyprus mobile database talk at Forrester’s Security & Risk event in November, they made the case for adopting AI despite the risks because the benefits are too great to pass up.
“Yes, it brings new threats,” Pollard said. “Yes, it brings new risks. But it’s all necessary for new opportunities to emerge. AI will help your team solve some of the most important problems.”
Generative AI Lives Up to Expectations
Unlike the hype around the metaverse, which has yet to become a reality, the AI situation is a different story, Pollard said. “If you look at what’s happening with generative AI in particular, the catalysts are lined up. There’s a lot of money being spent on it. There’s a lot of beta testing. It can be done within existing software and technology stacks,” he said.
The speed of AI adoption is a big concern among CISOs, he says. “It’s happening so fast… and that scares a lot of CISOs. It scares a lot of legal functions, and rightfully so. Risk is a great word when it comes to new technologies. But when you start thinking about risk, I want you to replace it with another word. And that word is trade-off. Because trade-off is the everyday language of risk.”