Network Security

Network Security | News, how-tos, features, reviews, and videos

cyber security lock padlock firewall code breach password
Windows security and protection [Windows logo/locks]

6 antivirus

Why the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

10 cloud security breach virtualization wireless

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

Windows security and protection [Windows logo/locks]

10 top security enhancements in Windows Server 2019

This new version of Windows Server offers several significant security upgrades over Server 2016, including tools to track ransomware and other malware, and to track lateral movement attacks.

cyber security lock padlock firewall code breach password

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

network of connections / digital matrix

Review: Protecting API connections with Forum Sentry

The Forum Sentry API Security Gateway goes beyond access control and deep into security, monitoring all the connections that it forms between systems and enforcing very granular security policies.

Microsoft Windows 10 logo bandage data map
Updated

Best new Windows 10 security features: More patching, updating flexibility

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1809 feature release.

network interface connections

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

wrenches in different sizes / an iterative process of development or repair

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

binary rain / cloud / data / information / internet of things

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

Movie preview test pattern
Updated

Best security software: How 20 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software.

binary chains / linked data / security / blockchain

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

teach train grunge abcs learn

5 cyber security basics you can't afford to ignore

Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack.

login credential - user name, password - administrative controls

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

security trust

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

Load More