Data Security, Enterprise Identity

Cisco’s Private 5G Solution Security Overview

October 12, 2022

Cisco’s Private 5G Solution Security Overview
Cisco’s Private 5G (P5G) solution, offered as a service, is designed to fit seamlessly into existing enterprise networks and provide private cellular networking capabilities for that enterprise. The solution builds on Cisco’s enterprise networking best practices and a clear understanding of enterprises’ understanding and expectations of private networks.

Spotlight

Kivu Consulting

Kivu combines technical and legal expertise to deliver investigative, discovery and forensic solutions worldwide. Kivu’s digital forensic investigators are experienced in protecting organizations against compromise of data, theft of trade secrets and unauthorized access to data. Our qualifications include forensic certifications (Encase Certified EnCE, SANS GCIH Incident Handlers, Certified Ethical Hackers, and reverse malware experts); IT certifications (Certified Information Systems Security Professional CISSP and Certified Information Systems Auditor CISA); and professional backgrounds as legal counsel, IT administration, and network security. Kivu’s investigators have testified as computer forensic experts in state and federal court, and presented their findings to state and Federal regulators.

OTHER WHITEPAPERS
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

CyberSecurity Under Stress

whitePaper | August 11, 2022

SecOps teams in the US and UK are being asked to do more with less, leading to higher stress levels that impact both their work and personal lives. The growing risk from cyber attacks is also compounded by significant recruitment and retention issues within cybersecurity.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More

Spotlight

Kivu Consulting

Kivu combines technical and legal expertise to deliver investigative, discovery and forensic solutions worldwide. Kivu’s digital forensic investigators are experienced in protecting organizations against compromise of data, theft of trade secrets and unauthorized access to data. Our qualifications include forensic certifications (Encase Certified EnCE, SANS GCIH Incident Handlers, Certified Ethical Hackers, and reverse malware experts); IT certifications (Certified Information Systems Security Professional CISSP and Certified Information Systems Auditor CISA); and professional backgrounds as legal counsel, IT administration, and network security. Kivu’s investigators have testified as computer forensic experts in state and federal court, and presented their findings to state and Federal regulators.

Events