Network Security

Network Security | News, how-tos, features, reviews, and videos

teach train grunge abcs learn

5 cyber security basics you can't afford to ignore

Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack.

login credential - user name, password - administrative controls

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

security trust

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

cellphone tower

Can you hack me now?

How identity-based networking can protect your LTE connections from attack.

lock spyware security network hacker crime antivirus

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat.

eye security privacy time clocks deadline

Threat detection: it’s about ‘time’

Incident response is a slave to time. From time-to-detection through time-to-containment, time is the crucial factor when responding to any threat.

eliminate insider threats 1

The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.

intro security vulnerability

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

team of hackers / organized attack / group of threat actors

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The...

lock binary circuits

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.

shadowy attacker hooded

Attacker attribution is hard, but sometimes easier than you think

Attribution of an attacker, and uncovering his or her true identity, remains a vexing problem for incident response teams. But in certain cases, it can be solved. Advanced telemetry and geofencing technologies offer the potential to...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Improving access certification processes makes life easier for business users. But that’s not the point

When you do everything possible to make access certifications easier, you’re not just doing business users a favor. You’re improving the security posture of the entire organization.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

9 screen locking device lock down authentication

The behavioral economics of authentication

Organizations can now implement authentication technologies that improve security and user experience. Consumers just need some nudging to follow along.

1 intro security executive thinking woman face binary

Stop playing “whack-a-mole” with your security

Google does it, so can you. Stop dealing with IT security problems when they happen; start addressing the root cause.

network security digital internet firewall binary code

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

digital security concept > lock / keyhole / circuits / network connections

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

Load More