Network Security

Network Security | News, how-tos, features, reviews, and videos

secure system / network security policy management
Microsoft Windows  >  Defending against attacks

mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.

Windows logo / life preserver / rescue / recovery / fix / resolve / solution

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem.

analyzing performance of wireless mobile connectivity data statistics

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro.

Backdoors & Breaches  >  Incident Response Card Game

Backdoors and Breaches incident response card game makes tabletop exercises fun

New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise.

FireMon network security policy management
Updated

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

secured vpn tunnel

What is WireGuard? Secure, simple VPN still in development

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

capture the flag hackathon face off

"Penn Test" challenge helps infosec team think like attackers

At Penn Medicine, gamifying security training builds skills, drives employee retention.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

security threat / danger / attack / warfare / grenade-shaped flash drive with abstract connections

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release.

Windows logo / life preserver / rescue / recovery / fix / resolve / solution

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit.

Cybersecurity  >  Internet security threats

Is your MSP an insider threat?

Managed services providers and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk.

onion layers / binary code

Can Security Onion replace your commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it.

Red team  >  Hackers coordinate an attack.

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how.

Alan Hill, chief information and digital officer, University of Exeter; CIO UK Summit, London [2019]

Wargaming at Exeter helps keep the university battle ready

Alan Hill of the University of Exeter says more universities need to understand who is targeting them and why to improve cybersecurity defenses and improve incidence response.

Load More
You Might Also Like