Networking
Networking | News, how-tos, features, reviews, and videos
How and why deepfake videos work — and what is at risk
Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.
What is cryptojacking? How to prevent, detect, and recover from it
Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.
DDoS explained: How distributed denial of service attacks are evolving
A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...
COPPA explained: How this law protects children's privacy
The Children's Online Privacy Protection Act is a U.S. law that aims to protect the privacy and personally identifying information of children under the age of 13 who use online services.
Remote work raises threats from consumer IoT devices
With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.
SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear
SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.
Publicly known support credentials expose GE Healthcare imaging devices to hacking
The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.
Beyond the firewall: Intrusion Detection Systems
Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.
New US IoT law aims to improve edge device security
The Internet of Things Cybersecurity Improvement Act will require device manufacturers to meet new security standards for government contracts. Carryover effect expected for the private sector.
Five ways to keep working from home safe for your employees and your company
For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.
InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices
IPStorm's ability to infect Android, macOS and Windows devices as well as those that are Linux-based makes it much more dangerous.
Edge computing: The next generation of innovation
The future of enterprise tech won't be confined to the data center mothership -- nor even the public cloud. Wedded to the internet of things, edge computing puts processing horsepower wherever it needs to go.
The five best Kubernetes security practices
Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?
8 things your security team needs to know about WPA3
All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.
Latest Microsoft Windows security update options explained
New features might require you to change current update policies, especially if you're supporting more remote workers.
RDP hijacking attacks explained, and how to mitigate them
Attackers take advantage of a Windows Remote Desktop Protocol feature to take over previously disconnected sessions and appear as a legitimate user to gain system access and control,
Optimizing VPNs for security: 5 key tasks
As the need to support remote workers becomes long-term, it's wise to check your VPN configuration to minimize vulnerabilities.
Solar power shines light on security for the renewable energy industry
Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
Sponsor Article
Sponsored
BrandPosts
Learn more-
Sponsored by Extrahop