Network Security

Network Security news, trend analysis and opinion

managed security service providers
best vpn routers smb 1

firewall

What users love (and hate) about 4 leading firewall solutions

Here, users give a shout out for some of their favorite features of firewalls from Fortinet, Cisco, Sophos and Palo Alto Networks, but also offer up a little tough love.

Veriflow Systems applies formal verification to prevent network outages and breaches  

Networks change often to accommodate business needs. Veriflow says it has a way to verify those changes before they are made

treasury dept building

Treasury Department took over 8 weeks to fully patch Juniper security vulnerability

The security hole in the Juniper firewall existed for at least three years, but no data was stolen.

bad security habits

Illumio’s cyber assessment program helps find new attack surfaces ASAP

The program can reduce the number of possible paths malware can traverse, minimizing the blast radius of any breach.

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

System Protected computer screen security

Network visibility can reverse the security asymmetry challenge

With end-to-end network visibility, a business can build a baseline of what ‘normal’ traffic looks like and investigate any deviations from it.

Hacking Team hacker DIY guide

Hacker who hacked Hacking Team published DIY how-to guide

The hacker who hacked the Hacking Team explains how he did it and includes tips to avoid being busted.

AV software: “I’m not quite dead yet”

Many organizations continue to use and benefit from antivirus software, while others have yet to use all of its capabilities.

Learning about SDP via Google BeyondCorp

Google’s software-defined perimeter (SDP) architecture can act as a model that enterprise organizations can emulate and enhance over time.

powerline networking tips

Veriflow promises to bulletproof networks

Eliminating both outages and breaches is the Holy Grail for network professionals. Can Veriflow deliver?

super fast gigabit internet speed

Light will ultimately secure the Internet, scientists say

Absolute secure information will eventually be made available through a revolutionary light-based password exchange now that a technical limitation has been removed, say researchers.

robots taking jobs 16

How to fight off bots attacking your site

I took over admin duties for a popular community website. It’s popular with bots. The bots have been busy trying to crack the site. They’re getting fairly good at it.

01 youth

Keeping your kids safe along with your network

Security pros talk about the lessons learned when dealing with kids and computers.

cutcaster 902639337 passenger ship sinking survivors in life raft small

Hundreds of cloud apps still vulnerable to DROWN

DROWN was disclosed on March 1, but a full week later 676 SaaS applications were still vulnerable to the attack.

Cybersecurity Skills Shortage Impact on Cloud Computing

CISOs must plan for expansive cloud growth AND a lack of cybersecurity professionals with cloud computing skills

Comodo's "default deny" approach keeps known and unknown malware from endpoints  

Many endpoint protection solutions allow files to open and applications to run if they are not confirmed as malicious, but unknown files can cause tremendous harm. Comodo denies unknown files access until they are proven to be...

An Abundance of Incident Response Bottlenecks

ESG research indicates that manual processes, skills shortages, and technology integration gaps make it extremely difficult to prioritize and respond to cybersecurity incidents in a timely manner

deep thinking ai artificial intelligence

How to use deep learning AI to detect and prevent malware and APTs in real-time  

Deep Instinct has introduced a solution that has been shown to have a 98.8% accuracy in detecting APTs in real-time

Load More