Network Security

Network Security | News, how-tos, features, reviews, and videos

A conceptual security grid of locks overlays a network / datacenter / server room.
microsoft 365 channel attributes apps

access control / authentication / privileges / security / key

Active Directory security updates: What you need to know

These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.

ipsecurity protocols network security vpn3

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs.

network security / network traffic scanning

Lessons learned from 2021 network security events

Rather than predict what 2022 will bring, let's manage the future by implementing the lessons learned from this year's biggest security threats.

remote work concept working at home telework picture id1223790327

CISOs, what's in your work-from-home program?

CISOs reveal how their secure remote work strategies are set up for the long haul.

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

business travel / airport terminal walkway / traveller

CISOs, what's in your travel security program?

It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.

a hooded figure targets a coding vulnerability

4 ways to properly mitigate the Log4j vulnerabilities (and 4 to skip)

A sure-fire way to prevent exploitation of Log4j vulnerabilities has yet to appear, but these actions are your best bet for reducing risk.

video conferencing / remote work

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

ipsecurity protocols network security vpn3

Log4j mitigation advice for Microsoft security and IT admins

The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.

Security system alert, warning of a cyberattack.

Cybereason, Google Cloud launch XDR solution to streamline threat detection and response

New joint solution enhances ability to predict, detect, and respond to cyberattacks at scale across endpoints, networks, identities, cloud, and workspaces.

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Automated and open source tools can help you conduct web application, network, and database penetration tests.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the...

wireless security vulnerability

Researchers warn about continuous abuse of unpatched MikroTik routers

Attackers are still exploiting unaddressed vulnerabilities in an estimated 300,000 MikroTik routers. A new tool will detect compromised devices.

Outdated, obsolete computer systems in need of updating display binary code.

Your Microsoft network is only as secure as your oldest server

It's time to inventory your network to identify systems to replace or migrate away from.

15 troubleshoot printer

New HP MFP vulnerabilities show why you should update and isolate printers

Researchers have discovered two dangerous vulnerabilities in HP multifunction printers that use its FutureSmart firmware, including one that is exploitable remotely.

CSO  >  malware / virus / security threat / protective antivirus shield

How to prevent sideloading attacks in Windows and Office 365

A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.

email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

Load More