Network Security

Network Security news, information, and how-to advice

shadows of team figures collaborating, each holding up gears that work together
blind spot side view mirror car vehicle

eye binary IDS Intrusion Detection System

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

5 fumbling dumb mistake

Dear IT security pros: it's time to stop making preventable mistakes

Examining commonalities: shared strategies or mistakes across multiple cybersecurity incidents.

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

eye binary IDS Intrusion Detection System

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Dislike! Social media addiction

Facebook's free VPN acts like spyware to iOS users in the U.S.

Facebook's new VPN service for iOS users in the U.S. claims to provide security protections, but it also tracks users -- collecting mobile data traffic.

Man pointing to security icon for email

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

keys to access solutions rubic cube puzzle

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

Microsoft Windows 10 logo bandage data map

What’s new in Windows 10 security features: The anti-ransomware edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for 1709, Fall Creators Edition.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

stretched money budget

11 tips for prioritizing security spending

How to keep things locked down when you can't afford new locks.

network security digital internet firewall binary code

Defending outside the firewall

The risks and rewards of the intelligent edge.

cool cat with sunglasses independent

3 reasons why security automation is as cool as blockchain

When security teams take advantage of automation, they can rapidly triage alerts, investigate incidents, contain threats, and protect their companies and customers faster than ever before.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

nup 177120 0001

How the International Olympic Committee can win gold in cybersecurity

While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

security internet network encryption privacy padlock

How to speed up security tool evaluation and deployment

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

Load More