<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>WAN &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/wan/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 11 Jul 2020 07:55:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>WAN &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>German BfV warns of China&#8217;s data collection. Active scans for unpatched Citrix instances. C-Data backdoors. Ransomware market.</title>
		<link>https://risk-academy.ru/german-bfv-warns-of-chinas-data-collection-active-scans-for-unpatched-citrix-instances-c-data-backdoors-ransomware-market/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 11 Jul 2020 07:55:02 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Alexandre Torres]]></category>
		<category><![CDATA[Citrix]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[WAN]]></category>
		<category><![CDATA[ZDNet]]></category>
		<category><![CDATA[Shenzhen]]></category>
		<category><![CDATA[Pierre Kim]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<category><![CDATA[SANS Institute]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/german-bfv-warns-of-chinas-data-collection-active-scans-for-unpatched-citrix-instances-c-data-backdoors-ransomware-market/</guid>

					<description><![CDATA[The AP says that yesterday&#8217;s annual report of Germany&#8217;s Bundesamt für Verfassungsschutz warned that consumers providing information to Chinese companies may also be providing it to the Chinese government. Attackers [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="summary-text1">
<p>The AP says that yesterday&#8217;s annual report of Germany&#8217;s Bundesamt für Verfassungsschutz warned that consumers providing information to Chinese companies may also be providing it to the Chinese government.</p>
<p>Attackers are actively scanning for recently patched vulnerabilities in Citrix Application Delivery Controller (ADC), Citrix Gateway, and the Citrix SD-WAN WANOP appliance, the SANS Institute reports. Users are urged to apply the patches as soon as possible.</p>
<p>Security researchers Pierre Kim and Alexandre Torres report finding vulnerabilities in widely used Fiber-To-The-Home (FTTH) and Optical Line Termination (OLT) devices sold by Shenzhen-based C-Data. ZDNet observes that, of the seven vulnerabilities found, the most serious is the hardcoding of Telnet accounts in the firmware. These grant intruders full administrative access to the devices. Security Affairs points out that the backdoors appear to be intentional.</p>
<p>A Zoom zero-day affects older and no-longer-supported Windows systems (Windows 7 and earlier) too many of which remain in use, according to 0Patch. ZDNet says Zoom is working on a fix.</p>
<p>BleepingComputer reports that Ryuk ransomware is fading while its malware sibling,&#8230;</p>
</div>
<p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/133">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Simplifying SD-WAN Operations with Centralized Management and Orchestration</title>
		<link>https://risk-academy.ru/simplifying-sd-wan-operations-with-centralized-management-and-orchestration/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 24 Jun 2020 14:22:48 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[WAN]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Digital technology]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Information and communications technology]]></category>
		<category><![CDATA[Centralized Management]]></category>
		<category><![CDATA[communications overlay]]></category>
		<category><![CDATA[wide-area networking]]></category>
		<category><![CDATA[costly overlay solutions]]></category>
		<category><![CDATA[Orchestration Software]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/simplifying-sd-wan-operations-with-centralized-management-and-orchestration/</guid>

					<description><![CDATA[Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support digital innovation. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="drr-container" itemprop="articleBody">
<p>Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support digital innovation. However, far too many SD-WAN solutions lack critical networking and security features, requiring organizations to add complex and costly overlay solutions to manage and protect their SD-WAN deployments.</p>
<p>For example, one critical issue organizations face – especially when a large number of SD-WAN devices have been deployed – is orchestrating communications, workflows, and other traffic between branch offices. While a traditional WAN model is certainly inefficient from a bandwidth or application management perspective, its hub and spoke model for connecting remote environments is relatively simple to deploy and manage. Since SD-WAN enables direct connections to the internet, however, building a communications overlay requires a complex, fully meshed VPN solution that can be a nightmare to design, implement, and manage.</p>
<p>The best approach to addressing this and similar challenges, such as SD-WAN security, is through integration, </p>
</div>
<p><a href="https://www.networkworld.com/article/3563880/simplifying-sd-wan-operations-with-centralized-management-and-orchestration.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
