Network Security

Network Security | News, how-tos, features, reviews, and videos

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]
cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

windows 11 logo bloom

What are the new Windows 11 22H2 security features?

The September Windows 11 update add protections against malicious applications and drivers, phishing, credential misuse, and more.

Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

Top 5 attack surface challenges related to security operations

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.

SAP sign

Most common SAP vulnerabilities attackers try to exploit

Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks.

Hands type on a laptop keyboard.

Recommended security resources for Microsoft Active Directory

These resources will keep you up to date on how to best protect your Active Directory domains.

locked phone and virtual data [mobile security]

In-app browser security risks, and what to do about them

Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.

password azure protection security policy

How Azure Active Directory opens new authentication risks

Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

Top 12 managed detection and response solutions

These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

saas

Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution

Cybersecurity vendor updates Prisma solution to help customers address increasing SaaS security challenges, along with detecting and preventing phishing, ransomware, and C2 attacks.

rules rulebook letters compliance regulation by alex ishchenko getty

Resolving conflicts between security best practices and compliance mandates

Sometimes the latest security best practices don't align with an organization's compliance templates. These are some of the areas where you might need an exception.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

Key takeaways from the Open Cybersecurity Schema Format

The OCSF looks to standardize and normalize the data that cybersecurity tools generate with the goal of making them work better together.

zero trust security model secured network picture id1313494602

Sorting zero-trust hype from reality

Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts.

internet web browser

DNS data indicates increased malicious domain activity, phishing toolkit reuse

Akamai research discovers phishing toolkit reuse played a key role in increased malicious domain activity in the second quarter of 2022.

The shadow of hand unsettlingly hovers over a keyboard.

Researchers warn of darkverse emerging from the metaverse

Cybercriminals see the metaverse as a way to launch cyberattacks, launder money, and carry out disinformation campaigns.

Cybersecurity  >  Email security threats, such as phishing

Sophisticated BEC scammers bypass Microsoft 365 multi-factor authentication

Analysis of the BEC campaign reveal weaknesses in Microsoft's authentication system.

email security lock breach protocol by microstockhub getty

Why business email compromise still tops ransomware for total losses

Losses from business email compromise (BEC) scams are about 50 times greater than those caused by ransomware. Here's why BEC is favored by cybercriminals.

Two people review information on a tablet in an office workspace.

6 best practices for blue team success

Every stakeholder, from the CISO to even the red team, wants the blue team to succeed against simulated cyberattacks. Sticking to this advice will help make that happen.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Universal database of device vulnerability information launched

DeviceTotal's new repository includes security data for all devices on the market with the aim to better mitigate vulnerabilities.

Load More