Networking
Networking | News, how-tos, features, reviews, and videos
Cato Networks launches SSE system with customizable DLP capabilities
Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.
GPS trackers used for vehicle fleet management can be hijacked by hackers
At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."
Barracuda report: Almost everyone faced an industrial attack in the last year
Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.
Dozens of insecure-by-design flaws found in OT products
The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.
Microsoft includes IoT devices under its Secured-core program
The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.
Cryptojacking explained: How to prevent, detect, and recover from it
Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.
Exium expands SASE, 5G-based security for midsize enterprise networks
The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
SolarWinds launches overarching management, monitoring for hybrid cloud
Hybrid Cloud Observability pulls together siloed monitoring and management tools on a single interface.
Fragmented tool landscape biggest cybersecurity challenge to medical device makers
Continuous monitoring of security throughout the medical device product lifecycle also poses problems.
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
A risk-based approach restricts access to specific resources and capabilities within applications.
Fortinet tightens integration of enterprise security, networking controls
Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software.
CISA warns of attacks against internet-connected UPS devices
Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.
Palo Alto launches cloud-native firewall service for AWS
Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.
What is Shodan? The search engine for everything on the internet
Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.
What is SSL? How SSL certificates enable encrypted communication
SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.
Man-in-the-middle (MitM) attack definition and examples
A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....
What is NAC and why is it important for network security?
NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers
Windstream Enterprise launches managed SASE with Cato Networks
The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.
What is XSS? Cross-site scripting attacks explained
Cross-site scripting (XSS) is a cyberattack in which a hacker enters malicious code into a web form or web application url.