Network Security

Network Security news, information, and how-to advice

umbrella businessman protection stormy dark insurance
Stack of legal documents with compliance and regulatory stamp

Cybersecurity operations more difficult than it was 2 years ago

New ESG research finds more threats, more work and more alerts make it difficult for cybersecurity professionals to keep up.

23922465470 fe3c8b8cdf o

The 15 biggest data breaches of the 21st century

Security practitioners weigh in on the 15 worst data breaches in recent memory.

collaboration overload2

IT is NOT Cybersecurity

The differences between IT and Security teams and why you need both. In less than 10 years, we will all look back and wonder how businesses ever got along without both teams. Cybersecurity is not a function of IT operations.

Movie preview test pattern

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories.

3 phishing

11 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

phishing threat

Phishing: The basics

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. Because the best defense is a skeptical user, here's...

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Las Vegas Sign for Blackhat DefCon Event [by Skeeze / CC0 via Pixabay]

3 tips to get the most out of Black Hat/Defcon

Las Vegas. Hate it or love it, for seven days each year Sin City is the gathering place for BSides Las Vegas, Black Hat, and DEF CON. Combined, these events are arguably the largest security gathering in North America, with...

transporter effect

7 elements of a successful security awareness program

Action items for CSOs looking to bolster their security awareness programs.

executives sitting in board room at conference table

Where to spend your next security dollar

Use executive security education to build your security program.

money handout

Cybersecurity spend: ROI Is the wrong metric

Think about what your network defenders do throughout the day, every day, in the course of getting their jobs done. Can you describe it in one sentence? How would you characterize the thousands of tasks that the InfoSec team fields...

cybersecurity shield and gear image

Cisco and IBM announce historic cybersecurity partnership

Cisco Security and IBM Security join forces to battle cybercrime, helping customers reduce the time to detect and mitigate threats.

abstract image business handshake cityscape 100708907 large

Why can’t security have SLAs?

You always hear about the five-nines. The typical amount of time laid out in a service-level agreement that a network should be online. Can that same premise pertain to security? Vendors said no.

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

Learning from the ROI of WannaCry

What the earnings indicate about enterprise security practices and unknown future attacks.

Load More