Networking

Networking | News, how-tos, features, reviews, and videos

digital twins woman in profile ai mirror duplicate duo pair
healthcare technology / medical data

hand holding paper cloud for Microsoft Azure logo

Microsoft Azure launches DDoS IP protection for SMBs

DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies.

abstract industrial iot internet of things

Engineering workstation attacks on industrial control systems double: Report

Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.

CSO > global security

Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.

IoT security strategy from enterprises using connected devices

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

cloud security

Aryaka rolls out cloud-based web gateway for SASE-focused WAN offering

Aryaka's Secure Web Gateway and Firewall-as-a-Service adds cloud-based security services to its Zero Trust WAN platform, as it moves toward providing SASE capabilities for its users.

VPN on iPhone

97% of enterprises say VPNs are prone to cyberattacks: Study

Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler.

3 security vendors

Most enterprises looking to consolidate security vendors

Three-quarters of all enterprises expect to reduce the number of security vendors they use according to a recent survey, more than double the number from 2020.

Wi-Fi_twilight_blur_800.jpg

Medical device vulnerability could let hackers steal Wi-Fi credentials

Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...

man holding pen drawing a heartbeat and red heart

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis

Heartbleed is a vulnerability in OpenSSL that came to light in April of 2014; it can be traced to a single line of code.

saas

Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution

Cybersecurity vendor updates Prisma solution to help customers address increasing SaaS security challenges, along with detecting and preventing phishing, ransomware, and C2 attacks.

Two people review information on a tablet in an office workspace.

6 best practices for blue team success

Every stakeholder, from the CISO to even the red team, wants the blue team to succeed against simulated cyberattacks. Sticking to this advice will help make that happen.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Universal database of device vulnerability information launched

DeviceTotal's new repository includes security data for all devices on the market with the aim to better mitigate vulnerabilities.

Computerworld - Scary Tech [Slide-02] - IoT that’s always listening

China, Huawei, and the eavesdropping threat

In the world of intelligence, “capability present” changes the conversation from if to when. Huawei is an espionage threat not because of what it has done but because of what it can do.

virtual network security picture id1208405529

Cato Networks launches SSE system with customizable DLP capabilities

Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.

security system vulnerabilities - a grid of locks with several unlocked

GPS trackers used for vehicle fleet management can be hijacked by hackers

At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."

Industry 4.0 / Industrial IoT / Smart Factory

Barracuda report: Almost everyone faced an industrial attack in the last year

Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.

Dozens of insecure-by-design flaws found in OT products

The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.

Load More
You Might Also Like