Network Security

Network Security news, trend analysis and opinion

Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.

20151005 Cisco headquarters sign

Cloud security: A mismatch for existing security processes and technology

Enterprises use, but often abandon, traditional security controls to protect cloud-based applications and workloads.

High-demand cybersecurity skill sets

Specialized cybersecurity skills around cloud computing represent the biggest gap.

data security ts

3 ways to protect data and control access to it

Your company's data is its crown jewels, and you must protect it all times. CIS Critical Security Controls 13, 14 and 15 will help you.

pros & cons

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Enterprise IT professionals who use these leading security information and event management (SIEM) products identify the most valuable features and the areas needing improvement.

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

Hewlett Packard Enterprise servers

DDoS costs, damages on the rise

Peak-time distributed denial of service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.

The rise of threat intelligence gateways

These network appliances automatically block known threats, mitigate risk and streamline security operations.

managed security service providers

Rip up the script when assembling a modern security team

Characteristics that a modern security team needs to combat sophisticated hackers

best vpn routers smb 1

Zscaler provides secure remote access without the need for a VPN

Zscaler Private Access promises to provide access to organizations' internal applications and services while ensuring the security of their networks.

firewall

What users love (and hate) about 4 leading firewall solutions

Here, users give a shout out for some of their favorite features of firewalls from Fortinet, Cisco, Sophos and Palo Alto Networks, but also offer up a little tough love.

Veriflow Systems applies formal verification to prevent network outages and breaches  

Networks change often to accommodate business needs. Veriflow says it has a way to verify those changes before they are made

treasury dept building

Treasury Department took over 8 weeks to fully patch Juniper security vulnerability

The security hole in the Juniper firewall existed for at least three years, but no data was stolen.

bad security habits

Illumio’s cyber assessment program helps find new attack surfaces ASAP

The program can reduce the number of possible paths malware can traverse, minimizing the blast radius of any breach.

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

System Protected computer screen security

Network visibility can reverse the security asymmetry challenge

With end-to-end network visibility, a business can build a baseline of what ‘normal’ traffic looks like and investigate any deviations from it.

Hacking Team hacker DIY guide

Hacker who hacked Hacking Team published DIY how-to guide

The hacker who hacked the Hacking Team explains how he did it and includes tips to avoid being busted.

AV software: “I’m not quite dead yet”

Many organizations continue to use and benefit from antivirus software, while others have yet to use all of its capabilities.

Load More