Network Security

Network Security news, trend analysis and opinion

cisco logo
nordvpn

dashboard analytics stats monitoring

4 resources to find free Cisco skills and certification labs

Cisco offers a wealth of instruction - some of it free - for increasing networking skills or prepping for certification exams.

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

3 sensitive data hacker phone

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

human weak link cybersecurity primary

Systemic cybersecurity crisis looms

Executive perception that security is just another cost, implementing bare bones security measures and growing threats could lead to a cybersecurity crisis.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

death of the office telephone

When phone systems attack

Weaknesses in our nation's 911 network continue to expose themselves, mostly by accident. The latest incident was with the 911 system in Amarillo, Texas.

internet security privacy

Information security in an insecure world

A guide for current and aspiring CTOs about the process of securing your data and platforms and receiving security certification

internet security privacy

The insecurities list: 10 ways to improve cybersecurity

Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users.

Cybersecurity

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Fortinet CISO Philip Quade explains why organizations have to adjust their security strategies to protect critical infrastructure.

alert detection prevent hacker hacking2

Complete security deception includes detection and incident response

Finding a threat solves only part of the problem. A complete security deception solution will also enable better incident response.

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

wikileaks

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

google cloud plans primary

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Load More