Access "Address IPv6 security before your time runs out"
This article is part of the April 2013 / Volume 15 / No. 3 issue of Managing identities in hybrid worlds
Time, and space—address space that is—are running out. Internet Protocol version 4 (IPv4), the networking standard on which the Internet has been built, is expected to reach its IP address limit of roughly 4.3 billion in a few years. While most enterprises can survive for now with just a handful of IP addresses (thanks to Network Address Translators—NATs—which allow multiple devices to be connected to the public Internet with a single public IPv4 address), the burgeoning number of Internet-connected mobile devices and non-traditional objects like cars, appliances and smart meters demands that the Internet’s phone book expand its listings. Enter Internet Protocol version 6 (IPv6). IPv6 was designed to succeed IPv4 and accommodate the future growth of the Internet by providing a much larger address pool than IPv4. Hopefully, this isn’t the first time you’ve read about IPv6: awareness activities, such as the World IPv6 Launch Day, and the deployment of IPv6 in large content providers such as Google and Facebook, has been going on for years, and recently ... Access >>>
Premium Content for Free.
Managing identities in hybrid worlds
by Peter H. Gregory
Are you losing control of access management as SaaS and mobile devices take hold? To achieve better operational consistency and scale, consider a centralized IAM system.
Address IPv6 security before your time runs out
by Fernando Gont
Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.
- Managing identities in hybrid worlds by Peter H. Gregory
Botnet takedowns: A dramatic defense
by Kathleen Richards
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.
- Botnet takedowns: A dramatic defense by Kathleen Richards
Security transitions: Changes that make a difference
by Robert Richardson
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
CISOs: From no seat to multiple hats
by David J. Sherry
The CISO role in many enterprises is expanding beyond security risk mitigation to risk management, privacy and regulations, and compliance.
Why information security education isn’t making the grade
by Doug Jacobson and Julie A. Rursch
Security experts explain why a holistic approach to security is critical to training computer engineers and computer scientists for a career in information security.
Cyberwar calls for software and system investment, not hacking back
by Gary McGraw, Contributor
Hacking back isn't the way to win the cyberwar. Gary McGraw says building software and systems with fewer vulnerabilities is stronger protection.
- Security transitions: Changes that make a difference by Robert Richardson
More Premium Content Accessible For Free
Next-generation authentication technologies emerge to restore balance
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization security dynamics get old, changes ahead
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Insider edition: Layering mobile security for greater control
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...