Network Security

Network Security | News, how-tos, features, reviews, and videos

keyboard laptop microsoft edge logo web browser by urupong getty images 1200x800

How to harden Microsoft Edge against cyberattacks

Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.

Tech Spotlight   >   The Future of Work [CSO]   >   Laptop user with virtual security overlay.

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Technology as infrastructure / IoT / Internet of Things / Smart Home / building automation

Remote work raises threats from consumer IoT devices

With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.

One lock in a series is unlocked / weakness / vulnerability

Tips to harden Active Directory against SolarWinds-type attacks

The SolarWinds attackers took advantage of Active Directory to gain a foothold. Here's what configurations and policies to check to better protect your network.

A hacker attacks from within a Windows system.

Top SolarWinds risk assessment resources for Microsoft 365 and Azure

Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Binary Russian flag

SolarWinds hack is a wakeup call for taking cybersecurity action

Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.

cyber attack alert

How to prepare for and respond to a SolarWinds-type attack

If you can perform these tasks on your Windows network, then you are properly prepared to respond to a nation-state attack like SolarWinds.

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

How to block malicious JavaScript files in Windows environments

Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.

Email takeover  >  Puppeteer hands manipulating strings

How to avoid subdomain takeover in Azure environments

Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Why 2021 will be a big year for deception technology

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.

A conceptual representation of accessing username and password credentials.

4 Windows 10 settings to prevent credential theft

Review these Windows settings to make sure you're not making it easy for attackers to steal login credentials.

Declining line graph / decreasing trend chart showing impact of the virus

Top 4 security trends to watch for 2021

Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.

Windows security and protection [Windows logo/locks]

How attackers exploit Windows Active Directory and Group Policy

Attackers have learned to use Active Directory and Group Policy to find weaknesses in Windows networks and identify targets. Here's what you can do to prevent that.

Social media threats / risks / dangers / headaches  >  Text bubbles bearing danger signs

4 tips for partnering with marketing on social media security

Threat actors watch social media accounts to gather intelligence about a targeted company. Here's how to get marketing to work with security to minimize the risk.

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How to use Windows Defender Attack Surface Reduction rules

With Microsoft's Attack Surface Reduction, you can set rules to block risky actions for each workstation on your network.

iot internet of things chains security by mf3d getty

New US IoT law aims to improve edge device security

The Internet of Things Cybersecurity Improvement Act will require device manufacturers to meet new security standards for government contracts. Carryover effect expected for the private sector.

supply chain management connections - ERP - Enterprise Resource Planning

China’s exclusion from US 5G market likely to continue with Biden administration

Telecom insiders discuss supply chain security and call for better communication, collaboration, and transparency from the federal government about threats within their industry.

Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.

Load More