Network Security
Network Security | News, how-tos, features, reviews, and videos
Microsoft 365 Advanced Audit: What you need to know
Microsoft's powerful new auditing options will help detect intrusions and see what was accessed...if you've paid for the right licenses.
10 things work-from-home employees can do now to help protect the network
WFH employees are now more susceptible to attacks that steal credentials or plant malware. Have them follow this advice to better protect themselves and the business.
How to defend against OAuth-enabled cloud-based attacks
Use these settings in Microsoft Azure Active Directory to take control of user-requested OAuth access permissions.
DDoS explained: How distributed denial of service attacks are evolving
A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...
How to harden Microsoft Edge against cyberattacks
Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.
6 top security technologies to protect remote workers
Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.
Remote work raises threats from consumer IoT devices
With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.
Tips to harden Active Directory against SolarWinds-type attacks
The SolarWinds attackers took advantage of Active Directory to gain a foothold. Here's what configurations and policies to check to better protect your network.
Top SolarWinds risk assessment resources for Microsoft 365 and Azure
Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.
The 15 biggest data breaches of the 21st century
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
SolarWinds hack is a wakeup call for taking cybersecurity action
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
How to prepare for and respond to a SolarWinds-type attack
If you can perform these tasks on your Windows network, then you are properly prepared to respond to a nation-state attack like SolarWinds.
How to block malicious JavaScript files in Windows environments
Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.
How to avoid subdomain takeover in Azure environments
Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.
Why 2021 will be a big year for deception technology
New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.
4 Windows 10 settings to prevent credential theft
Review these Windows settings to make sure you're not making it easy for attackers to steal login credentials.
Top 4 security trends to watch for 2021
Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.
How attackers exploit Windows Active Directory and Group Policy
Attackers have learned to use Active Directory and Group Policy to find weaknesses in Windows networks and identify targets. Here's what you can do to prevent that.
-
White Paper
-
White Paper
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet