Category: Uncategorized

Detecting and Mitigating Ripple20 Vulnerabilities

JSOF recently published information on 19 vulnerabilities they found in the Treck TCP/IP stack used by many device manufacturers that enables their devices to communicate over a network. The vulnerabilities were originally discovered in September of last year. While there is no indication that these vulnerabilities have been exploited in the wild, any threat to…

Read More

Ordr and Gigamon: Network and Device Visibility

Peter Drucker may have directed his famous adage, “you can’t manage what you can’t measure,” to business managers, but these words ring just as true for network and security managers. Technology leaders constantly measure and manage risk, performance, capacity, and numerous other metrics. However, there’s an important corollary: You can’t measure what you can’t see….

Read More

A Blueprint for IoT Automation

Automation is the hidden key to a successful IoT implementation. To see why, it’s important to understand the current profile and strategic direction of IoT projects. In Nemertes’ 2019-2020 IoT research study, we found that 68% of participants were in proof-of-concept (POC) or early production (less than 25% complete) stages of their IoT rollouts. Half…

Read More

Ordr and FIPS Certification

Last week, Ordr announced the expansion of our NIST FIPS 140-2 validated product offerings. As one of the only next-generation IoT vendors to support this, this announcement is both a reflection of our commitment to our Federal and public sector customers, as well as a testament to the continued speed of innovation by our engineering…

Read More

Security Best Practices for Working From Home

In the last couple of weeks, most organizations have transitioned to a work-from-home model for the majority of employees. Unfortunately, we’ve seen a rise in cyberattacks such as Coronavirus-themed phishing attacks and ransomware by hackers taking advantage of these circumstances. It’s important to be extra vigilant as this may be the defacto work mode for…

Read More

Making Sure RSA 2020 is in Ordr…

For the first time, Ordr is taking our message of proactive protection for today’s modern enterprise to the floor – and a few parties – at the RSA Conference in San Francisco.  Come join us! Chances are, you’re a security practitioner for a thoroughly modern enterprise; and chances are, you and your team are frantically…

Read More

Don’t Orphan Your IoT Project!

Companies across a wide swath of vertical industries are deploying IoT in a range of use cases to improve business processes, drive revenue, and reduce costs. In our recent 2019/2020 IoT research study, Nemertes found that 67% of 403 participating firms said they had IoT initiatives (or would have them by the end of 2019.)…

Read More

Hey, Let’s Implement Zero Trust Across the Enterprise. It’s Easy, Right??

It’s an unassailable reality for today’s enterprise organizations:  security and network teams must continue to do more to address the rapidly growing mass of devices that are being connected to their networks.  And they absolutely must keep up with this increased device scale without the benefit of analogous scale to their resources, neither human nor capital. …

Read More

A Tree is Worth a Thousand Leaves

The Numbers Game Today, virtually every device connects to the enterprise network. From simple function IoT devices to multi-million-dollar operational systems, modern devices utilize data connectivity to perform highly specialized tasks much more intelligently. The sheer heterogeneity of these devices is growing exponentially. Effectively regulating these devices, in terms of what it can and cannot do…

Read More