Network Security

Network Security news, information, and how-to advice

nordvpn
thayer public library braintree ma

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

threat intelligence secrets sharing

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

falcons nfc champion

What football teaches us about cybersecurity

You wouldn’t expect your football team, that never practices, to win the Super Bowl but we expect our cybersecurity professionals win every day.

Password entry

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

Injection syringe needle vaccinate

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

head scratcher strategy thinking

Inadequate intelligence integration

Threat intelligence can add value to your security posture but it usually doesn’t.

security

SIEMs sometimes suck

By leveraging these capabilities your SIEM rules won’t be based on “hope” but rather empiric evidence. You will be sure you are getting the right source data and preforming the relevant correlations necessary to trigger on real...

1 bullet

5 reasons why Web gateways aren’t bulletproof

Like the threat landscape itself, web gateways have changed over the years. Today, web gateways do much more than enforce regulatory compliance and HR policies – organizations rely on web gateways to thwart internet-borne threats....

cloud security challenges 2

What to do when your network is wide open

How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

eu civil protection exercise

In 2017, real action on cybersecurity will happen after loss of life

Post describing the possibility of a hybrid terrorist attack involving a conventional, real-world component amplified by a simultaneous distributed denial of service attack directed at first responder computing infrastructure.

law attorney

Law firms subject to same cyber risk as others, but is compliance required?

Law firms are handling some of the most sensitive and private information, this includes but is not limited to healthcare, private business deals, financial assets, mergers and acquisitions, intellectual property, credit cards and so...

trump smug

Donald Trump offers cybersecurity warning: 'No computer is safe'

Donald Trump showed off his IT security credentials at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

crystal ball future tech servers

My obligatory 2017 predictions

Tis the information security season to make predictions about what security year 2017 will bring.

2016 software predictions

Yogi Berra was never in the cybersecurity business

It's tough to make predictions, especially about the future. Except one: Your company will get hacked in 2017. Cyberattacks are so common and so discrete that it's virtually a sure thing that hackers will at least probe, and probably...

Network servers datacenter

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months.

nighthawk-family

Netgear working to fix flaw that left thousands of devices open to attack

A remotely exploitable vulnerability in the Nighthawk line of Netgear routers was disclosed on Friday. The flaw leaves customers exposed to having their connections hijacked, as someone exploiting the vulnerability can take complete...

Load More