Network Security

Network Security | News, how-tos, features, reviews, and videos

succession brain sharing intellectual knowledge sharing

How threat intelligence sharing can improve the security posture of whole industries

UBS and industry peers conduct joint cyber war games to improve security posture and incident response of the whole sector.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Bear trap.

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

Man pointing to security icon for email

What are DMARC, SPF and DKIM? How to master email security with these protocols

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

security audit - risk assessment - network analysis

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks.

network security digital internet firewall binary code

Ransomware attack drives city to seek greater network visibility

After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.

binary code

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks.

Microsoft Windows update arrows on laptop and mobile phone

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now.

red padlock cybersecurity threat ransomeware

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019 included talk about cybersecurity and business leaders coming together, managed services, cloud security, network security and more.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

What are the new China Cybersecurity Law provisions? And how CISOs should respond

New provisions to the China Cybersecurity Law allow the Chinese government access to enterprise networks operating in the country. Although the security risk that presents is unclear, CISOs can take steps to minimize the impact.

IoT > Internet of Things > network of connected devices

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

big data / data center / server racks / storage / binary code / analytics

Better, badder, bigger SIEM coming your way, folks, courtesy of Google

Google/Alphabet's Chronicle cybersecurity moonshot has a doozy of a mega-gargantuan SIEM with huge pluses--and minuses. Take note.

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

security command center monitors control center getty goro denkoff

How 5 universities stretch security capabilities, budgets with shared SOC

Faced with limited resources and constant threat of attack, five midwestern universities created OmniSOC, a CSO50 award-winning joint security operations center, to complement their own on-site SOCs with 24/7 analysis, triage and...

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

security threats and vulnerabilities

What is an advanced persistent threat (APT)? And 5 signs you've been hit with one

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

Load More