Posted in Cyber Security | Tagged Compliance, Cyber Security, Cybersecurity, Internet of Things, PCI DSS, Penetration Testing, TOR and Tails |
Posted in Cyber Security | Tagged Compliance, Cyber Security, PCI DSS, Penetration Testing |
Posted in Cyber Security | Tagged Cyber Security, Cybersecurity, Uncategorized |
Where are the IPv6 vulnerabilities?
What you need to do.
Currently your IPv6 traffic is “tunneled” across an existing IPv4 network because we live in an IPv4-dominated world. This tunneling creates an entry point for many vulnerabilities yet to be discovered, although quite a few have already been discovered. The majority of our network traffic monitoring tools are also based on IPv4 computer networking. Focusing on IPv4 protocols without an equal emphasis on IPv6 traffic puts us at risk in this mixed-IPv6 world. We may only be seeing part of the picture.
The truly disquieting aspect of IPv6 is that it is constantly looking for configuration information from network routers. This information is easily falsified and may be used to auto-configure IPv6 stacks. There are also many opportunities to “fuzz” the IPv6 protocol to find weaknesses specific to stack implementation. While IPv6 is not currently accessible outside of the local network, this means that the local network may be vulnerable to attack from within, while IPv4 monitoring tools sit idly by.
Further, stack-level compromises do not require services to be enabled on a target machine, exposing a vulnerability at a level below web, ftp, and other network services. Therefore, a machine with no network services whatsoever may become a victim of an IPv6-based attack. So for those networks that don’t need IPv6 – disable it! For those that do, consider securing your IPv6 implementation:
- Make sure that IPv6 routing information is authoritative for your IPv6 domain
- Make sure that IPv6 naming services are authoritative for your IPv6 domain
- Ensure that IPv6 parameters applicable to your stack are configured and not open to auto-configuration
- Ensure that firewalls that support IPv6 are configured properly
- Keep in mind that IPv6 traffic is often tunneled over IPv4
While most security companies tend to focus only on the IPv4 network, essentially missing some vulnerabilities that experienced attackers may use to compromise your network, VIMRO actively examines IPv6 as a component in our network assessments. Contact VIMRO now for the complete protocol picture for your networked systems. firstname.lastname@example.org (800) 272-0019
Follow VIMRO on LinkedIN
VIMRO’s Official Website
Connect with Michael on LinkedIN
Additional VIMRO Advanced Cybersecurity Posts
Posted in Cyber Security | Tagged Cyber Security, Cybersecurity |
Any reference to cybersecurity in the Payment Card Industry (PCI) context strikes fear into the hearts of professionals across the globe. Its nebulous requirements and their extensive drain on both IT and business efforts can eat up resources faster than an F22 fighter jet gulping down jet fuel. Worse yet are the constantly changing standards! The latest incarnation of the Data Security Standard (PCI DSS 3.0) contains new language that leaves a considerable gap in understanding the changes to the requirements imposed on organizations. READ MORE
Posted in Cyber Security | Tagged Compliance, Cyber Security, Cybersecurity, PCI DSS, Uncategorized |
VIMRO uses three types of assessment methods to accomplish this: testing, examination, and interviewing.
- Testing is the process of exercising one or more assessment objects under specified conditions. This is used to compare actual and expected behaviors.
- Examination is the process of checking, inspecting, reviewing, observing, studying, or analyzing one or more assessment objects to facilitate understanding, to achieve clarification, or to obtain evidence.
- Interviewing is the process of conducting discussions with individuals or groups within an organization to facilitate understanding, achieve clarification, or identify the location of evidence. Assessment results are used to determine security control effectiveness over time.
- VIMRO has extensive experience in ST&A for both commercial and government enterprise and clouds-based ecosystems.
Download Advanced Cyber Security Overview PDF
“VIMRO’s Security and Networking Solutions and Services focus on measurable results and outcomes. Leveraging multidisciplinary teams comprised of handpicked experts, we design and implement a strong security and networking strategy. We are dedicated to delivering solutions and services that deliver the greatest business value for our clients.”
Vadim Hiekin, Founder and CEO
Posted in Cyber Security | Tagged Cyber Security, Enterprise Tech Infrastructure |
Posted in Cloud Computing, Tech Sales Institute | Tagged . Check Point Software, Aruba, Avaya, Blue Coat Systems, Brocade, CISCO, Cloud Computing, CSCO, EMC, Enterprise Tech Infrastructure, F5, F5 Networks, Fizz, Fortinet, GOGRID, HPQ, Michael Horsch Fizz, NetApp, Rackspace, RIVERBED, ruckus, SDN NFV, SWOT Review - Strength / Weakness / Opportunity / Threat, Tech Sales Institute, Technology Market Trends and Outlook |
“Real gross domestic product — the output of goods and services produced by labor and property located in the United States — increased at an annual rate of 0.1 percent in the first quarter (that is, from the fourth quarter of 2013 to the first quarter of 2014), according to the “advance” estimate released by the Bureau of Economic Analysis. In the fourth quarter, real GDP increased 2.6 percent.” source: www.bea.gov
For FCI and GLG clients, schedule your consult to review how this specifically impacts current and expected tech spending in the enterprise space.
The full text of the release on BEA’s Web site can be found at www.bea.gov/newsreleases/national/gdp/gdpnewsrelease.htm
Posted in Cloud Computing, Tech Sales Institute | Tagged Blue Coat Systems, Brocade, CA, Checkpoint, CISCO, Cloud Computing, disaster recovery, EMC, Enterprise Tech Infrastructure, F5, HP, IBM, Juniper, Michael Horsch Fizz, NetApp, networking, optimization, Oracle, Radware, ruckus, SDN NFV, security, storage, SWOT Review - Strength / Weakness / Opportunity / Threat, Tech Sales Institute, Technology Market Trends and Outlook |
2013:Q4 and annual 2013 schedule your consult to review Q1 2014 IT Enterprise spending trends and it’s correlation to GDP.
Posted in Uncategorized | Tagged Uncategorized |
Minor WINS. Critical ERRORS. What’s NEXT?
Availability Date: 05/01/2014
Current FCI clients: Verbal SWOT reviews are available through your secured login.
Online Scheduling App: 1) Select Service “Vendor SWOT Review” 2) Select Advisor “Michael Horsch Fizz”.
SWOT price start at $2,200.00
SWOT reviews by request available for most TECH Vendors.
FCI Clients must schedule all consults directly with FCI
Posted in Uncategorized | Tagged CISCO, Citrix, Enterprise Tech Infrastructure, F5 Networks, SDN NFV, SWOT, SWOT Review - Strength / Weakness / Opportunity / Threat, Tech Sales Institute, Technology Market Trends and Outlook |