Network Security

Network Security news, information, and how-to advice

think ponder reflect
switchboard operators

network security digital internet firewall binary code

Review: Corelight is a worthy network packet sniffer

In the tradition of other great network analysis tools like Bro and Sourcefire, Corelight gives security pros deep insight into data traffic on the systems they defend.

Windows security and protection [Windows logo/locks]

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks.

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

six big projects that went open source 1

Rethinking security

6 foundational steps to make your enterprise security program effective.

abstract data statistics

The time for network behavior analytics has come

Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

Movie preview test pattern
Update

Best security software: How 12 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

trophy gold silver

Getting security ‘right’

We love to talk about doing things right, there is no such things as doing it right. Perfect is the enemy of good and also of modern infrastructure.

Security alert for incoming threats.

Review: Seceon soups up standard SIEM

The Open Threat Management Platform essentially acts as both an SIEM and a frontline security appliance. Thrifty firms may want to consider eliminating some of their other cybersecurity programs if they duplicate what the OTM is...

open door with sunlight shining through

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

data protection

Cybersecurity outlook: data protection takes center stage

From an ever-increasing uptick in data breaches to the rise of Cybercrime-as-a-Service, data protection will continue to be top of mind for CIOs and their teams through 2018 and beyond.

symantec banner

Symantec in a position to progress and prosper

Symantec has some internal challenges and increased competition, but it appears to be facing these challenges from a position of strength in the market.

fail frustration laptop user head desk

The impact of human behavior on security

People should be the last thing in charge of cybersecurity. Remove people and add transparency and automation for true protection.

access computer through your phone skeleton key unlocking

How IAM can help move the finish line for hackers

Identity and access management can be leveraged by an enterprise to secure a network that might already be compromised. Here's how...

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

Load More