Network Security

Network Security | News, how-tos, features, reviews, and videos

a hooded figure targets a coding vulnerability
cisco logo fit

rules rulebook letters compliance regulation by alex ishchenko getty

Sigma rules explained: When and how to use them to log events

Sigma rules allow you to detect anomalies in log events and identify suspicious activity.

binary cyberattack cybersecurity hacked protected

How to mitigate Active Directory attacks that use the KrbRelayUp toolset

Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.

Browsers version 100 bug

ConcealBrowse isolates malicious software before it can work its mischief

Agent-based solution screens code to prevent browser-borne attacks on the enterprise.

Cybersecurity

RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

security audit - risk assessment - network analysis

How to audit Microsoft Active Directory

Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.

5G mobile wireless network

U.S. government proposals spell out 5G security advancements

A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

5 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Patching the latest Active Directory vulnerabilities is not enough

Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities.

modern server room with server racks in data center picture id1186291565

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

CSO: Have you met these hackers? [slide 11]

DOJ: Good faith security research won’t be charged under Computer Fraud and Abuse Act

The U.S. Department of Justice revises its policy regarding charging violations of the CFAA. Good faith security research will no longer be charged.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

authentication

How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

An abstract network of nodes or endpoints.

What Microsoft Defender can tell you about your network

Microsoft Defender for Business alerts can show what's happening in your network. The better you understand your network, the faster you can triage alerts.

managed security service providers

Palo Alto, Deloitte enter U.S. MSSP market with expanded partnership

The Palo Alto-Deloitte announcement introduces a significant new player into the growing managed security service provider space as organizations increasingly invest in specialized services to address cyberthreats.

ransomware attack

What your cyber insurance application form can tell you about ransomware readiness

The annual cyber insurance application form shows what the carriers think you should be doing to best prevent and recover from ransomware attacks. Pay attention.

Load More