Network Security

Network Security news, information, and how-to advice

tunnel threat
hacked hacker breach security

big data lessons

Cybersecurity is the killer app for big data analytics

Big data apps help combat cyber-threats and attackers.

lock security breakthrough

Review: Breakthroughs in endpoint security

In our recent roundup of anti-virus programs, we discovered several new techniques being employed by anti-virus companies to make PCs safer against advanced threats.

Extreme Hacks to Be Paranoid About

Software developers are failing to implement crypto correctly, data reveals

Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures

handing over keys

Cisco warns of default SSH keys shipped in three products

The flaw could allow an attacker to decrypt traffic exchanged by three Cisco virtual appliances

security ciso

How CISOs can create security KPIs and KRIs

The Information Security Forum recommends that CISOs take a four-step approach to creating key performance indicators (KPIs) and key risk indicators (KRIs) to support informed decision-making.


Vendor claims these three steps will prevent data breaches

Cheesy headlines aside, Netwrix, a firm that focuses on change and configuration auditing, has published a curious list of steps that are said to be the key in preventing a data breach. Yet, if these three steps are all that's needed,...

uss fort worth bridge

The US Navy's warfare systems command just paid millions to stay on Windows XP

The U.S. Navy is paying Microsoft millions of dollars to keep up to 100,000 computers afloat because it has yet to transition away from Windows XP. They've signed a US$9.1 million contract earlier this month for continued access to...

certificate encryption

Free SSL/TLS certificate project moves closer to launch

Let's Encrypt will start issuing a few certificates next month while it ensures the system is reliable

cardinals baseball

FBI investigates St Louis Cardinals over Houston Astros hacking

Suspicions were raised after internal Astros information began appearing online last year

sharing medical records

Hijacked medical devices can leave networks exposed

Hacked medical devices can pose dangers to patients, but they can also serve as lairs from which malware finds its way into medical facilities’ networks and persists even after initial attacks have been cleaned up.

binary code open source

Open source: Big benefits, big flaws

Open source code is popular for good reasons: It is free, it is open, it can easily be customized to fit the needs of a developer or organization, and there is a "community" of participants who are able to spot flaws or other...

flashlight darkness

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

outsource in house ts

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. But according to a new study from CompTIA, companies that don't use managed service providers are more...

orchestra tiltshift

DevOps orchestration tools represent a new risk to the enterprise

DevOps is becoming a preferred software development technique, but this shift provides a whole new set of concerns.

fox hedgehog

DevOps improves security

Two experts in the security field debate how DevOps affects security.

aztec serpent

Mind the gaps: A holistic approach to securing the network

Securing a network becomes more challenging when the enemies are deceptive, clever, and savvy snakes, but recognizing the gaps in their security strategies before the criminals do can help organizations minimize detection and response...

online shooter game

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

In a demo posted on YouTube, the researcher shows how a flaw in the Unity Web Player could let an attacker access a Gmail account

radiology tomography

Attackers targeting medical devices to bypass hospital security

A report from TrapX Labs highlights three successful attacks against healthcare organizations. The incidents prove that defending assets in a healthcare environment isn't as easy as some would have you think.

Load More