Network Security

Network Security news, trend analysis and opinion

Splunk intent on extending cybersecurity leadership

The Splunk user conference (.Conf2016) highlights a balance between powerful new features and ease-of-use benefits.

google self driving car at the googleplex

marblehead neck house by victor cruz

Always be prepared: Monitor, analyze and test your security

Critical Security Controls: Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20.

illusive networks swift guard

Illusive Networks seeks to slow Swift attackers through deception

Today's savvy bank robbers don't break into vaults looking for gold or diamonds: They're more likely to be hacking networks looking for access to the Swift payment system.

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

SIEM market dynamics in play

Financial churn combined with new requirements are transforming the SIEM market for enterprise organizations.

1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

global network

Massive solar storm will ‘kill’ the internet, says space expert

The movement of Earth’s magnetic poles is making solar storm-driven network damage more likely. The answer is to start building shields.

Cybersecurity Goes Private: McAfee and RSA

Good opportunities but challenges ahead for both companies

cloud building security

Implementing secure WANs in the cloud age

Over the past few years most organizations have significantly increased their reliance on the Internet, primarily due to the outsourcing of utility applications like email, unified communications, ERP, CRM, etc., to SaaS providers....

bad security habits

VMware NSX gains traction as a security tool

VMware customers may not be keen on NSX as a networking solution, but they’re discovering it can help them align security with other data center trends.

VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

cybersecurity

IT security’s reality distortion field

IT security has a reality distortion field when it comes to perimeter security. IT needs to create a 'Secure Breach' environment to safeguard data.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

monster

Where the monsters live

Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.

More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

Load More