Network Security

Network Security news, information, and how-to advice

Met museum puts new technologies on display
Family in silhouette waving goodbye at airport

change management

Keep the change: 9 steps to adapting to IT security

Changing the way we look at "security" could make the difference in how successful we are. Here's a step-by-step process CSOs and their teams can implement to integrate any type of GRC or Infrastructure Security change initiative into...

it project failures

The 7 worst automation failures

A list of the moments when technology monumentally backfired.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

showerhead clean hygene

How to clean up security vulnerabilities with better cyber hygiene

One of the more neglected aspects of network security is people. Just as we grew up learning good personal hygiene practices, we are now obligated to teach similar practices among the users of our networks to prevent cyber attacks and...

roulette wheel zero

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

internet of things

Missing the mark on IoT security

Focusing on securing Internet of Things (IoT) devices is all the rage right now, but companies that are fixated on this specific issue are overlooking the more obvious solutions to their problems.

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

dirty numbers playground

Microsoft keeps to Bill Gates' roots of cybersecurity

A look at the software giant's startling cybersecurity statistics.

Philip Quade

Fortinet hires NSA veteran as company's first CISO

The network security provider has hired former NSA cyber task force executive Philip Quade as chief information security officer.

CISOs

Congrats - you’re the new CISO…now what

Before you buy that new shiny product, throw that old one in the trash, hire that whiz kid dressed in black, or change that process, you need foundational visibility into your security posture regarding what’s working and what’s not....

verizon sign

Verizon's risky business: Acquiring the world's biggest hack

Verizon's biggest risk is acquiring Yahoo, victim of the biggest hack ever.

wifi symbol green

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

cybersecurity boards

Emboldening the CISO ecosystem

Cybersecurity recruitment and leadership adviser, Stephen Spagnuolo of ZRG Partners, discusses how the inaugural launch of the peer to peer HMG Strategy CISO Executive Leadership Summit will lead the way on strengthening the range,...

bingo sign

Before you buy another cybersecurity buzzword

Your security posture should not be based on assumptions. It should be based on empiric evidence. That empiric evidence can be derived by validating your controls with security instrumentation solutions. You may very well discover...

thayer public library braintree ma

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

Load More