Network Security

Network Security news, trend analysis and opinion

fiber internet ethernet cord networking

shutterstock 2185806731

Protecting against the next great heist by encrypting in-transit data

Encrypting sensitive and mission-critical data while in transit is essential in today's digital economy. Encryption at the optical layer during transport provides a strong and effective safeguard, offering an additional level of...

Loretta Lynch

Despite rhetoric, DoJ, NSA still seek backdoors

Department of Justice and NSA chiefs say they don’t want backdoors to decrypt private communications, but there’s no way to do that without backdoors.

Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion.

advanced detection threat
Clear Choice Tests

REVIEW: Cyphort makes advanced threat protection easier than ever

Over the past few months, we’ve reviewed a variety of cutting-edge security tools that combat advanced persistent threats (APTs); everything from threat intelligence to virtual sandboxing to privileged identity management. And while...

shrug

Network security vs. app security: What's the difference, and why does it matter?

The idea that time and resources should be invested in either network security or application security is misguided as both are equally as important to securing the enterprise.

Network Security Sandboxes Driving Next-Generation Endpoint Security

Anti-malware gateways are driving next-generation endpoint security implementation and antivirus replacements at large organizations.

hacker hacked power grid

Ukrainian power grid hack: What happened and what needs to change?

A former CISO in a critical infrastructure sector shares his thoughts

The Incident Response “Fab Five”

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation.

insider threats

11 tips for spotting insider threats

Security pros are constantly being warned about insider threats. We’re told our companies need next-generation software, integrated threat intelligence, and the ability to correlate massive amounts of event logs and context to arm...

Juniper will repatch its Netscreen operating system

After scrutinizing the two operating systems that run its networking and security products, Juniper Networks gives them both a clean bill of health, but it plans to replace a part of one that was exploited by unknown parties to...

bbc barriers

DDoS attack on BBC may have been biggest in history

A group calling itself New World Hacking said that the attack reached 602Gbps. If accurate, that would put it at almost twice the size of the previous record of 334Gbps, recorded by Arbor Networks last year.

deception hack hacker phishing tricked

The ins and outs of deception for cyber security

Today’s deception technologies abandon reliance on known attack patterns and monitoring and use advanced luring techniques and engagement servers

cutcaster 904855936 businessman escapes from crisis medium

5 cybersecurity trends to watch for 2016

As threats evolve and grow more sophisticated, securing IT systems is more important than ever.

alhambra granada spain

Building malware defenses: Control email, web browsers, and ports

Further examination of SANS Center for Internet Security's best practices.

WLC Menus

Device administration with Cisco WLC

My experience with a deep dive into device administration AAA with Cisco Wireless LAN controllers and the SourceFire/Cisco FirePower Manager software.

smartphone encryption

Essential tools for everyday encryption

Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think

how does endpoint security change image.jpg

Endpoint security still inadequate despite growing threats

There’s not enough good endpoint protection to go around for every endpoint type. Using protections that do exist to the fullest takes extra care.

Enterprises Need to Improve IT Vendor Risk Management

Time to demand strong security from ALL IT vendors before purchasing products and service.

Load More