Blog

How Cyber Threats in Healthcare are Evolving – And What to Do About It

May 17, 2018

How Cyber Threats in Healthcare are Evolving – And What to Do About It

Historically, cybersecurity practices in the healthcare industry have revolved mainly around securing medical records and ensuring patient privacy. However, the increasing reliance on operational technology (OT) throughout hospitals and healthcare networks has caused an evolution in cyberattacks. The uptick in interconnected devices in the medical field has created tremendous benefits for patient care, diagnosis and […]

Cybersecurity Defense in Depth: Archers Alone Won’t Defend the Castle

May 3, 2018

Cybersecurity Defense in Depth: Archers Alone Won’t Defend the Castle

The universal increase of interconnected devices has created virtually limitless opportunities for innovation and efficiency in almost every industry. However, it has also given hackers hundreds of thousands of new entry-points for attack. Unfortunately, there is no silver bullet – no one-size-fits-all solution that will completely protect your infrastructure against these kinds of threats and […]

Making Micro-Segmentation a Reality for IIoT Environments

April 10, 2018

Making Micro-Segmentation a Reality for IIoT Environments

Micro-segmentation enhances the efficiency of a security network by reducing the number of nodes to just two – a switch and a computer. This concept of point-to-point security with only two nodes in a network is the ultimate cybersecurity strategy which dates back to the 1960’s, and recently SDN has made it possible for modern […]

Why a VPN Is Not Enough for Secure Remote Access

March 8, 2018

Why a VPN Is Not Enough for Secure Remote Access

Cybersecurity Ventures predicts there will be 6 billion internet users by 2022 (75% of the projected world population of 8 billion) — and more than 7.5 billion internet users by 2030. VPNs have been around nearly as long as the internet, earning their keep as a means of connecting remotely to a private network over […]

Blue Ridge Networks Honored as a 2018 Top 10 Security Solutions Provider

March 5, 2018

Blue Ridge Networks Honored as a 2018 Top 10 Security Solutions Provider

Blue Ridge Networks was recently recognized by Government CIO Outlook as one of the Top 10 Security Solutions Providers in 2018. Other Companies named included Check Point Software Technologies, CyberRisk Solutions, Duo Security, Juniper Networks, PM America, StellarPeak Corp., Symantec Corporation, Synack, and Trend Micro. The annual list released by Government CIO Outlook was created […]

How to Improve Network Security by Breaking It Apart

February 22, 2018

How to Improve Network Security by Breaking It Apart

“If it ain’t broke, don’t fix it.” Despite the continued acceleration of cybercrimes, a shocking number of organizations take this line of thinking when it comes to cybersecurity. If you have been lucky enough to remain unscathed from the latest wave of sophisticated cyberattacks, you probably assume that your existing security technology is working just […]

BorderGuard Suite Selected as Finalist in 2018 Cybersecurity Excellence Awards

February 20, 2018

BorderGuard Suite Selected as Finalist in 2018 Cybersecurity Excellence Awards

The Blue Ridge Networks team is pleased to announce that our BorderGuard suite of products has been selected as a finalist in the Network Security category of the 2018 Cybersecurity Excellence Awards, an annual awards program recognizing excellence, innovation and leadership in information security. The awards are highly competitive within the cyber community. This year […]

Are You Protected from Spectre and Meltdown Processor Vulnerabilities?

February 1, 2018

Are You Protected from Spectre and Meltdown Processor Vulnerabilities?

Another week, another security vulnerability in the headlines. This one is especially bad and extremely widespread. Meltdown and Spectre leverage flaws in processors from Intel, AMD, and ARM-licensed processors that enable a variety of sophisticated cyber-attacks. For these vulnerabilities to be exploited, an attacker must be able to load or construct a specific sequence of […]