Networking

Networking | News, how-tos, features, reviews, and videos

virtual network security picture id1208405529

Cato Networks launches SSE system with customizable DLP capabilities

Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.

security system vulnerabilities - a grid of locks with several unlocked

GPS trackers used for vehicle fleet management can be hijacked by hackers

At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."

Industry 4.0 / Industrial IoT / Smart Factory

Barracuda report: Almost everyone faced an industrial attack in the last year

Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.

Dozens of insecure-by-design flaws found in OT products

The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.

Industry 4.0 / Industrial IoT / Smart Factory

Microsoft includes IoT devices under its Secured-core program

The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.

hacker / cryptocurrency attack

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

hybrid cloud 1

SolarWinds launches overarching management, monitoring for hybrid cloud

Hybrid Cloud Observability pulls together siloed monitoring and management tools on a single interface.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Fragmented tool landscape biggest cybersecurity challenge to medical device makers

Continuous monitoring of security throughout the medical device product lifecycle also poses problems.

Access control setting on a virtual display [authentication/privileges]

Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks

A risk-based approach restricts access to specific resources and capabilities within applications.

Fortinet tightens integration of enterprise security, networking controls

Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software.

Red flag warning button [alert / danger / disaster]

CISA warns of attacks against internet-connected UPS devices

Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

man in the middle phone on a string communicaiton

Man-in-the-middle (MitM) attack definition and examples

A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

An IT technician works on laptop in data center, with other IT staff in the background.

Windstream Enterprise launches managed SASE with Cato Networks

The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.

security risk - phishing / malware / social engineering

What is XSS? Cross-site scripting attacks explained

Cross-site scripting (XSS) is a cyberattack in which a hacker enters malicious code into a web form or web application url.

Load More
You Might Also Like