Network Security

Network Security news, information, and how-to advice

Injection syringe needle vaccinate
head scratcher strategy thinking


SIEMs sometimes suck

By leveraging these capabilities your SIEM rules won’t be based on “hope” but rather empiric evidence. You will be sure you are getting the right source data and preforming the relevant correlations necessary to trigger on real...

1 bullet

5 reasons why Web gateways aren’t bulletproof

Like the threat landscape itself, web gateways have changed over the years. Today, web gateways do much more than enforce regulatory compliance and HR policies – organizations rely on web gateways to thwart internet-borne threats....

cloud security challenges 2

What to do when your network is wide open

How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

eu civil protection exercise

In 2017, real action on cybersecurity will happen after loss of life

Post describing the possibility of a hybrid terrorist attack involving a conventional, real-world component amplified by a simultaneous distributed denial of service attack directed at first responder computing infrastructure.


Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

law attorney

Law firms subject to same cyber risk as others, but is compliance required?

Law firms are handling some of the most sensitive and private information, this includes but is not limited to healthcare, private business deals, financial assets, mergers and acquisitions, intellectual property, credit cards and so...

trump smug

Donald Trump offers cybersecurity warning: 'No computer is safe'

Donald Trump showed off his IT security credentials at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

crystal ball future tech servers

My obligatory 2017 predictions

Tis the information security season to make predictions about what security year 2017 will bring.

2016 software predictions

Yogi Berra was never in the cybersecurity business

It's tough to make predictions, especially about the future. Except one: Your company will get hacked in 2017. Cyberattacks are so common and so discrete that it's virtually a sure thing that hackers will at least probe, and probably...

Network servers

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months.


Netgear working to fix flaw that left thousands of devices open to attack

A remotely exploitable vulnerability in the Nighthawk line of Netgear routers was disclosed on Friday. The flaw leaves customers exposed to having their connections hijacked, as someone exploiting the vulnerability can take complete...

human analytics

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers. One vendor, Darktrace, is using machine learning to detect network threats.

false identity

Solve cybercrime by permanently linking physical space and cyberspace

A discussion of how to dramatically reduce cybercrime, cyber-terrorism, and cyber-espionage by using biometric credentials for internet transactions.

crime scence police tape

2016: A reflection of the year in cybercrime

A look back at 2016 predictions in cyber crime and how it all actually played out.

man in suit holding virtual email letter

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually had enforcement mechanisms in place.

analytics network monitoring

SIEMs-as-a-service addresses needs of small, midsize enterprises

Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical...

japan defense information infrastructure

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.

google brain

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.

Load More