Network Security

Network Security | News, how-tos, features, reviews, and videos

Movie preview test pattern
Updated

Best security software: How 18 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

networking background

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification.

cloud security lock

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.'

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

Man pointing to security icon for email

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

smart city - IoT internet of things - wireless network

Review: Monitoring IT, OT and IoT devices with ForeScout

ForeScout is one of a very few programs that can help to track and manage operational technology and IoT devices alongside of information technology. Everything from lighting controllers to HVAC units can be discovered and managed.

red padlock cybersecurity threat ransomeware

How to make cybersecurity incidents hurt less

Cybersecurity incidents can be severe, and could potentially cripple your company or land them in hot water with government and regulatory officials. It is crucial that your company be prepared for possible cybersecurity breaches.

mobile apps crowdsourcing via social media network [CW cover - October 2015]

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

pros and cons compare thumbs up thumbs down evaluate balance

AI in cybersecurity: what works and what doesn't

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in...

digital twins woman in profile ai mirror duplicate duo pair

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

donuts primary

Getting to know you: How continuous identity and access management transforms secure access

Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

Black Hat logo with woman in silhouette

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

speech bubble constructed from abstract letters

Cybersecurity acronyms businesses need to know

The cybersecurity market is becoming saturated with numerous acronyms representing technologies and concepts that may be alien to many. Here is a breakdown of some of the most common acronyms, how they relate to each other, and where...

20161101 cisco logo sign with clouds at partner summit 2016

Cisco buys Duo Security to address a ‘new’ security perimeter

Cisco's acquisition of Duo Security opens many new IAM and cloud security opportunities for Cisco, but additional work remains.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Risks associated with third-party access

Security processes to implement when dealing with third-party access to your company’s network.

vintage voltmeter gauge

Small biz simplifies and moves the needle

Smaller orgs are working to fulfill mission-critical functions and are actually moving the security needle. Meanwhile, enterprises seem to get distracted by the bright shiny objects at the expense of establishing strong preventive...

Audience at Black Hat Conference

Anticipating Black Hat USA 2018

Looking forward to learning more about new developments in artificial intelligence, cloud security, enterprise risk management, and lots of other topics

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

Load More