Network Security

Network Security | News, how-tos, features, reviews, and videos

Let's Encrypt automated encryption gears
Hands typing on a laptop keyboard binary code and a hazard symbol on screen.

Internet of Things (IoT) / security alert / wireless network management

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work.

VPN / Virtual Private Network  > A mobile phone connecting via VPN / network connections.

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need.

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

secured vpn tunnel

What is Wireguard? Secure, simple VPN still in development

The Wireguard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready.

network security / network traffic scanning

Why I’m not sold on machine learning in autonomous security

Some hard realities on the limitations of machine learning in autonomous netsec.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

Planning / strategy / management  >  Nurturing growth / scale / expansion

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface.

computer infection spreading

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.

black hat / hacker / spotlight / binary overlay

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

What is a zero day? A powerful but fragile weapon

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and...

hacked computer security symbol   hacked rot

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.

Targeting user behavior.

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.

6 network packet analysis data binary world

Network traffic analysis tools must include these 6 capabilities

Organizations want advanced analytics, threat intelligence integration, and IoT support among other things in network traffic analysis (NTA) tools.

Load More