Network Security

Network Security | News, how-tos, features, reviews, and videos

secured vpn tunnel

What is WireGuard? Secure, simple VPN now part of Linux

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography, and now it's built into Linux 5.6. Is it ready for the enterprise?

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Attack campaign hits thousands of MS-SQL servers for two years

Newly discovered Vollgar attack uses brute force to infect vulnerable Microsoft SQL servers at a high rate.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

5G light trails

5G without governance is risky business

5G implementations that fail to include baking in the needed governance safeguards will be subject to cost overages, inefficiencies and erosion of customer trust. Can your business afford that risk?

A Microsoft update gets ready on a screen also displaying a COVID-19 coronavirus visualization.

Securing Windows and Office in a time of COVID-19: update policies, remote options

Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.

Zero-trust / COVID-19 / pandemic

COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale

A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

A hacker attacks from within a Windows system.

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute.

interoperable gears / integrated tools / interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.

A glowing lightbulb stands out from the crowd of unlit lightbulbs.

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk

login credential - user name, password - administrative controls - access control - single sign-on

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that.

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

Kali Linux logo / gears / binary data

Kali Linux explained: A pentester’s toolkit

Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of.

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.

CSO > global security

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP).

A firmware message appears on a circuit board.

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.

RSA 2020's hot new startups

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

Windows security and protection [Windows logo/locks]

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Load More