Network Security

Network Security news, information, and how-to advice

crime scence police tape
man in suit holding virtual email letter

analytics network monitoring

SIEMs-as-a-service addresses needs of small, midsize enterprises

Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical...

japan defense information infrastructure

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.

google brain

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.

dock woman lonely

Warding off the blues of ransomware

Winter is definitely coming, but you can still avoid ransomware

hunting orange

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance...

DDoS Outage Map

Amateurs were behind the Dyn Inc. DDoS attack, report says

Flashpoint Intel released a brief after action report on Tuesday, outlining some of their observations following Friday’s DDoS attack against Dyn Inc., which affected traffic to a number of high-level domains. Among the report’s...

guilford county ems

Open Rsync server exposed EMS computers in Greensboro, NC

EMS computers in Guilford County, NC were exposed for an unknown length of time, because the server managing system updates was publicly available on the internet. The problem was discovered earlier this month by a researcher scanning...

DDoS Outage Map

DDoS knocks down DNS, data centers across the U.S. affected

On Friday morning, organizations across the internet – including GitHub, Twitter, Spotify, SoundCloud, Reddit, and the New York Times – disappeared after an attack was launched against Dyn Inc., an infrastructure provider that offers...

man in the middle primary

Man in the middle attacks on mobile apps

Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are...

SSL padlock icon

Performance, management and privacy issues stymie SSL inspections, and the bad guys know it

The technology is there for companies to inspect the SSL traffic going in and out of their networks, but performance, management and privacy concerns combine to hinder its adoption -- allowing cyberattackers to hide their malicious...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

colorful neon networking background

Trouble spotted on the network

No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

security group team circuitry

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

space launch systems

NASA CIO allows HPE contract's authority to operate to expire

In the wake of continued security problems, NASA's CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in 2011 to address problems with the agency's outdated and insecure...

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology is...

Load More