Network Security

Network Security | News, how-tos, features, reviews, and videos

iot internet of things chains security by mf3d getty
Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

4 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

adrian ludwig 1200x800px

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

micro segmentation security lock 2400x1600

How network segmentation mitigates unauthorized access risk

Two recent Microsoft vulnerabilities underscore the importance of segmenting your Windows network.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Biometric authentication, Edge browser

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 20H2 feature release.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

forensics threat hunter cyber security thumbprint

Tips to prep for digital forensics on Windows networks

Know what data you need to collect and how you will collect it before a security incident occurs on your Windows network.

green mesh rope network connections

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale...

IDG Tech Spotlight  >  Edge Computing [ CSO / September 2020 ]

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

How to optimize Windows event logging to better investigate attacks

The default event logging in Windows 10 won't give you enough information to properly conduct intrusion forensics. These settings and tools will help you collect the needed log data.

A router sits on a table amid abstract digital connections as a man works from a sofa in background.

8 things your security team needs to know about WPA3

All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

Printer / printing  >  network / deployment / connectivity / security.

How to secure vulnerable printers on a Windows network

Attackers look for unsecured printers as a point of access. Find them before they do. Here's how.

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

How to do remote deployments of Windows systems securely

Windows 10 provides a few options including Autopilot and AppLocker to securely and remotely deploy Windows devices and harden them against attack.

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Pentesting is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.

Load More