Machine-to-machine (M2M) communication, a vital component of the Internet of Things (IoT), continues to drive unprecedented innovation across industries. From smart homes to healthcare, transportation to manufacturing, M2M systems automate data exchange between devices, enabling greater efficiency and more intelligent operations. According to market data… Read More…
Preventing Remote Work Security Risks
The office environment has transformed significantly. Nowadays, employees are more likely to enjoy lunch in their backyards than in a sterile breakroom. Instead of enduring bumper-to-bumper traffic, they simply walk down the hallway from their bedroom to their home office. According to Upwork, over 32.6 million Americans will be working remotely by 2025… Read More…
Securing Enterprise Networks with Web Application Isolation on BYOD and Unmanaged Devices
The trend of “bring your own device” (BYOD) and the use of unmanaged devices has gained momentum in an increasingly digitally connected era. This trend is driven by the convenience of using personal devices that boast the latest technology and customizable features. While this shift has brought cost savings and productivity gains, it has also introduced… Read More…
Factors to Consider When Selecting Wireless IP Camera Solutions
While the use of cameras for security purposes is not new, the introduction of wireless IP cameras has significantly expanded security possibilities in a wide range of industries. Companies considering upgrading to wireless IP cameras need to consider several key elements before deciding on a solution… Read More…
Out of Band Network Management
When work-from-home orders went into effect in 2020, companies faced the problem of how to make sure their network administrators would be able to make the necessary updates and changes from their new home offices. Many companies had set up their network systems under the assumption that their company personnel would be on-site… Read more…
Next Generation Firewalls for Network Security
Next-gen firewalls move beyond the traditional layer-3 firewall that blocks traffic based solely on IP address. NGFWs include added security features such as content and device filtering, application-based rules, packet inspection, and intrusion detection and protection systems (IPS/IDS). These characteristics analyze and… Read more…
Private LTE with Motorola Nitro
In today’s world, Public LTE and Wi-Fi networks are a necessity. For many individuals and organizations, wireless services have become a “fourth utility” – a resource as critical as power, water, and gas. In spite of this, a few scenarios exist where the use of public LTE and Wi-Fi networks is not a viable option – leaving PLTE as the only solution. Read more…
Dnsmasq Vulnerabilities | AirLink Notice
Recently published research has identified two sets of vulnerabilities in dnsmasq, one set of memory corruption issues handling DNSSEC and a second set of issues validating DNS responses. The following Common Vulnerability and Exposure (CVE) identifiers have been assigned to each of the vulnerabilities… Read more…
ALEOS Buffer Overflow | AirLink Notice
A buffer overflow exists in the ACENet service, and this buffer overflow may allow remote code execution on some devices. The ACENet service is enabled by default on the WAN interface in ALEOS versions prior to 4.9.0, and is enabled by default only on the LAN interfaces in ALEOS 4.9.0 and later… Read more…
AMM Unauthenticated Login | AirLink Notice
Internal security testing by Sierra Wireless has uncovered a vulnerability in AMM session handling that allows an unauthenticated user to login with administrator privileges. A session handling flaw in the AMM user interface allows an unauthenticated user to login with administrator privileges… Read more…
- Page 1 of 2
- 1
- 2