Network Security

Network Security news, information, and how-to advice

20151005 Cisco headquarters sign
surgery hopital

dunce cap businessman corner dumb stupid corner mistake

How to avoid vulnerability assessment gotchas

Common findings and exceptions when auditing or performing a post-breach exam of vulnerability assessment effectiveness.

Mossack & Fonseca web site

Panama Papers data breach is now searchable online

A month ago the sky ripped open for a lot of people who had opted to use offshore companies to hide financial assets in order to avoid paying taxes. The breach came in the form of the Panamanian based law firm, Mossack Fonseca,...

pros & cons

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement.

walmart low price

Walmart confirms police report, says card readers compromised in Virginia

The Fredericksburg Police Department has issued a warning to Central Park shoppers after at least 37 people had their payment cards compromised, and bank accounts drained. In each reported case of theft, the victim had used their card...

chip pin credit card reader

Retailers must upgrade authentication, encryption and pen testing

The PCI Security Standards Council now requires better authentication, encryption and penetration testing by companies that accept consumer payments, improvements lauded by security expert.

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

Phishing attack

Phishing scams erode trust and compromise brand

While common and persistent, when potential client receive phishing scams from your organization, they make think twice about engaging in future business transactions

04 insider threat

Mitigating insider threats from a people perspective

Mitigating insider threats is an ongoing effort that requires a holistic approach that encompasses technological as well as human solutions. Additionally, organizational and situational factors can help mitigate the threat posed by...

time money

DDoS costs, damages on the rise

Peak-time distributed denial of service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.

Man squeezed between file cabinets

In the digital enterprise, everyone is a security newb

The responsibility of securing the extended network falls on more than just the security practitioners.

firewall

What users love (and hate) about 4 leading firewall solutions

Here, users give a shout out for some of their favorite features of firewalls from Fortinet, Cisco, Sophos and Palo Alto Networks, but also offer up a little tough love.

big windows logo wallpaper

Researcher uses Regsvr32 function to bypass AppLocker

A researcher in Colorado has discovered a feature in Regsvr32 that allows an attacker to bypass application whitelisting protections, such as those afforded by Microsoft's AppLocker. If the technique is used, there's little evidence...

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

identity management

Survey: Investment in identity management is booming

IT spending may be in a slump, but investment in identity management continues apace, according to a new survey.

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will you communicate through the challenges, learn from success stories, and dive into the most valuable features of today's...

high voltage line

Defining the threat in the energy sector

What are the categories of adversary faced by the energy sector in 2016? By analyzing their motivation and procedures we gain a better understanding of who might be a target and why.

global network of employees

Only a third of companies know how many vendors access their systems

The average company's network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision makers at mid-sized and large enterprises -- but only a third were confident...

Load More