Network Security

Network Security | News, how-tos, features, reviews, and videos

ransomware attack
DDOS attack

binary target

5 tips to protect legacy applications on Windows networks

You're probably running legacy applications somewhere, and attackers see them as vulnerable targets. This advice will harden legacy apps against threats.

A woman works from home with an abstract binary overlay in the surrounding environment.

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.

A laptop user works securely behind a firewall.

How to optimize Windows Firewall security

If you're ignoring or have disabled Windows Firewall, you might be missing out on some good, basic protections that are easy to set up and maintain.

A hacker attacks from within a Windows system.

The most important Windows 10 security event log IDs to monitor

Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

Microsoft Windows 7 security patches/updates

Local attackers can use Group Policy flaw to take over enterprise Windows systems

Microsoft issues a patch to fix a flaw that could allow compromised non-privileged user accounts to place malicious DLLs on a system.

scanning the internet malicious magnifying glass

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.

porting converting change update renew trees

8 ways to get more life out of an old SIEM

Can't update your old security information and event management system now? Use this advice to maintain its effectiveness.

CSO  >  Antivirus symbol on binary background

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.

cloud security expert casb binary cloud computing cloud security by metamorworks getty 100803072 or

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.

A conceptual representation of accessing username and password credentials.

Hashcat explained: Why you might need this password cracker

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.

digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

Failure frustration anger user man worker

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.

Cybersecurity lock with the abstract circuitry of a security fabric.

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

examining / analyzing / selecting / business data / statistics / analytics

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Passwordless authentication, Chromium-based Edge support

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 2004 feature release.

Conceptual image of a team reviewing data/alerts/solutions via a futuristic interface.

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

Load More