Networking

Networking | News, how-tos, features, reviews, and videos

shutterstock editorial 11745281m blackberry
iot internet of things chains security by mf3d getty

industrial power plant hacked skull and crossbone pixels security breach power plant by jason black

Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices

Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.

Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

Supply-chain attack on Kaseya remote management software targets MSPs

REvil ransomware pushers exploit zero-day flaw in Kaseya VSA to infect MSPs and their customers.

SD-WAN  >  The concept of a visual transition from hardware cables to software code.

5 things CISOs want to hear about SASE at the RSA Conference

Organizations are planning for secure access service edge (SASE) but have questions on how to get from their current state to converged, cloud-delivered networking and security. They’ll be looking for answers at RSA.

security threat / hacker / attack

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

A set of vulnerabilities in Wi-Fi’s basic design offers a long-standing and widespread threat vector, but the probability of compromise remains low.

hacker / cryptocurrency attack

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.

A 'GitHub social coding' mug sits in a desktop workspace.

15 open source GitHub projects for security pros

GitHub has a ton of open-source options for security professionals, with new entries every day. Add these tools to your collection and work smarter.

5G mobile wireless network

The race to secure 5G

The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cloudflare wants to be your corporate network backbone with centralized management and security

Magic WAN and Magic Firewall aim to simplify linking sites and datacenters while allowing organizations to better enforce security policies.

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

child coder boy with computer gaming children laptop

COPPA explained: How this law protects children's privacy

The Children's Online Privacy Protection Act is a U.S. law that aims to protect the privacy and personally identifying information of children under the age of 13 who use online services.

Technology as infrastructure / IoT / Internet of Things / Smart Home / building automation

Remote work raises threats from consumer IoT devices

With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.

Hacking stealing password data

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.

medical network h/ ealthcare IoT / hospital connections and communications

Publicly known support credentials expose GE Healthcare imaging devices to hacking

The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

iot internet of things chains security by mf3d getty

New US IoT law aims to improve edge device security

The Internet of Things Cybersecurity Improvement Act will require device manufacturers to meet new security standards for government contracts. Carryover effect expected for the private sector.

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

Load More