Network Security

Network Security | News, how-tos, features, reviews, and videos

05 malware
security command center monitors control center getty goro denkoff

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

security threats and vulnerabilities

What is an advanced persistent threat (APT)? And 5 signs you've been hit with one

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

security automation robot protects defends from attack intrusion breach

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

tools / toolkit

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

robot monitoringa  cog wheel system for maintenance [automation]

Aflac automates threat intelligence to take a proactive security posture

Insurance giant Aflac automated large parts of its cyber threat intelligence operations to create an industry-leading program.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings.

forensics threat hunter cyber security thumbprint

Why you need a digital forensics team (and the skills to look for)

Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks.

Movie preview test pattern
Updated

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

binoculars forecast spy privacy hacker watching

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

ladder to clouds

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

security command center monitors control center getty goro denkoff

12 top SIEM tools rated and compared

Security information and event management tools are a core part of most companies' cyber defenses. Use this guide to find SIEM options that best match your needs.

city network monitoring cityscape

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process.

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

firewall network security lock padlock cyber security

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs.

Load More