Network Security

Network Security news, information, and how-to advice

network security digital internet firewall binary code

Defending outside the firewall

The risks and rewards of the intelligent edge.

cool cat with sunglasses independent

3 reasons why security automation is as cool as blockchain

When security teams take advantage of automation, they can rapidly triage alerts, investigate incidents, contain threats, and protect their companies and customers faster than ever before.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

nup 177120 0001

How the International Olympic Committee can win gold in cybersecurity

While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

security internet network encryption privacy padlock

How to speed up security tool evaluation and deployment

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

man whispering

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point...

network security primary2

The Qubes high-security operating system gains traction in the enterprise

Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.

eliminate insider threats 1

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

security automation robot protects defends from attack intrusion breach

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders.

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

rules procedures manuals

10 old-school security principles that (still) rule

Oldies but goodies, these security tips have stood the test of time.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

swift bird sky flying

Basics for soaring above security challenges

Getting the basic “must-haves” right will not only enable you to handle today’s issues, you’ll establish an approach you can build upon to soar above a future of challenges.

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ai machine learning endpoint security big data

Artificial intelligence and cybersecurity: The real deal

AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

17 open source table laptop group

Are the BSDs dying? Some security researchers think so

To few eyeballs on code is a security issue. Can FreeBSD, OpenBSD, and NetBSD survive?

connection network blockchain artificial intelligence ai

How to connect anything, anytime, anywhere with identity-based networking

Breaking down address-defined barriers to connectivity with Host Identity Protocol (HIP).

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

face off boxing battle man in the middle

Anatomy of a well-run red-team exercise

Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack.

Load More