Network Security
Network Security | News, how-tos, features, reviews, and videos
Why the Huawei ban is bad for security
Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats.
Is AI fundamental to the future of cybersecurity?
Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.
Review: LogRhythm takes SIEM to the next level
LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.
10 penetration testing tools the pros use
Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.
Public SAP exploits could enable attacks against thousands of companies
A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do.
Review: FireMon clears the clutter for network security policy management
A pioneer in the field of network security policy management, FireMon provides full visibility into networks and devices, and overlays that knowledge with the rules, platforms, hardware and programs designed to protect it.
Updated
Security software reviews, 2019: Lab tests of today's top tools
We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.
Over 90% of data transactions on IoT devices are unencrypted
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
How to isolate a Windows 7 machine from your network
If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network.
Haas F1 team leans on service providers as security force multipliers
Formula One racing is expensive and comes with significant security concerns. An outsource-first policy lets a small security team effectively deal with threats at multiple locations.
How to implement and use the MITRE ATT&CK framework
The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment.
Review: How Awake Security uncovers malicious intent
This advanced network traffic monitoring platform identifies hidden threats and those that don’t use traditional malware, making it extremely powerful and useful in today’s threat environment.
Review: Barracuda Sentinel protects email where others fail
Email security may be the next big push in cybersecurity. Here's how Barracuda Sentinel fills the gaps left by gateway appliances.
Shared SIEM helps 3 UK local governments avoid outsourcing security
A single SIEM serves three UK councils, allowing for solution consolidation that saves costs while improving efficiency and regulatory compliance.
‘Nuff said!
The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...
How to outwit attackers using two Windows registry settings
These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access.
How Akamai implemented a zero-trust model
An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.
Why local governments are a hot target for cyberattacks
Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat.
5 threat detection and response technologies are coming together
Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.
How to evaluate SOC-as-a-service providers
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them.
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper