Network Security

Network Security | News, how-tos, features, reviews, and videos

red padlock cybersecurity threat ransomeware
mobile apps crowdsourcing via social media network [CW cover - October 2015]

pros and cons compare thumbs up thumbs down evaluate balance

AI in cybersecurity: what works and what doesn't

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in...

digital twins woman in profile ai mirror duplicate duo pair

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

donuts primary

Getting to know you: How continuous identity and access management transforms secure access

Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

Black Hat logo with woman in silhouette

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

speech bubble constructed from abstract letters

Cybersecurity acronyms businesses need to know

The cybersecurity market is becoming saturated with numerous acronyms representing technologies and concepts that may be alien to many. Here is a breakdown of some of the most common acronyms, how they relate to each other, and where...

20161101 cisco logo sign with clouds at partner summit 2016

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco's acquisition of Duo Security opens many new IAM and cloud security opportunities for Cisco, but additional work remains.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Risks associated with third-party access

Security processes to implement when dealing with third-party access to your company’s network.

vintage voltmeter gauge

Small biz simplifies and moves the needle

Smaller orgs are working to fulfill mission-critical functions and are actually moving the security needle. Meanwhile, enterprises seem to get distracted by the bright shiny objects at the expense of establishing strong preventive...

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

allscripts health care ransomware bitcoin

Samsam infected thousands of LabCorp systems via brute force RDP

LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and didn't result in a data breach. However, in the brief time between detection and...

bucket with holes breach security vulnerability

Review: Predictively locking down security with Balbix

Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category.

network security locks and cables

Are network-based security detection tools going dark?

For years, network security and detection solutions have been able to rapidly identify threats entering your network, before they hit your infrastructure or end users. The increased adoption of network encryption technologies like TLS...

wireless mobile network - internet of things edge [IoT] - edge computing

6 essential elements of edge computing security

Edge computing is fast becoming a new cybersecurity “front line” as users overlook security in their rush to get data and services deployed. Do you have a plan for patrolling the edge?

network security locks and cables

What I learned at Tufin's customer conference (Tufinnovate)

Massive network security changes, cloud adoption, and a pressing need for network security process automation were among the things discussed at Tufin's customer conference.

Load More