Networking

Networking | News, how-tos, features, reviews, and videos

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.
Industry 4.0 / Industrial IoT / Smart Factory

hacker / cryptocurrency attack

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

hybrid cloud 1

SolarWinds launches overarching management, monitoring for hybrid cloud

Hybrid Cloud Observability pulls together siloed monitoring and management tools on a single interface.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Fragmented tool landscape biggest cybersecurity challenge to medical device makers

Continuous monitoring of security throughout the medical device product lifecycle also poses problems.

Access control setting on a virtual display [authentication/privileges]

Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks

A risk-based approach restricts access to specific resources and capabilities within applications.

Fortinet tightens integration of enterprise security, networking controls

Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software.

Red flag warning button [alert / danger / disaster]

CISA warns of attacks against internet-connected UPS devices

Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

man in the middle phone on a string communicaiton

Man-in-the-middle (MitM) attack definition and examples

A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

An IT technician works on laptop in data center, with other IT staff in the background.

Windstream Enterprise launches managed SASE with Cato Networks

The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.

security risk - phishing / malware / social engineering

What is XSS? Cross-site scripting attacks explained

Cross-site scripting (XSS) is a cyberattack in which a hacker enters malicious code into a web form or web application url.

medical network h/ ealthcare IoT / hospital connections and communications

Critical flaws in remote management agent impacts thousands of medical devices

The Axeda platform, used by hundreds of IoT devices, has seven vulnerabilities, three of which allow for remote code execution.

Cybersecurity  >  abstract network of circuits data and lock

Gartner: SSE is SASE minus the SD-WAN

Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.

ip network devices

Gartner: 5 ways to deal with network equipment shortages

With lead times as long as 400 days, enterprises need to start looking at alternative ways to get the network equipment they need.

Load More
You Might Also Like