Network Security

Network Security news, trend analysis and opinion

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

SIEM market dynamics in play

Financial churn combined with new requirements are transforming the SIEM market for enterprise organizations.


1 noise

7 ways to avoid alert fatigue

Just like when your car alarm goes off incessantly, you don’t always run for the door thinking your car was stolen. If only there was a way to hear for when actual robbers are near your car or in this case network.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

global network

Massive solar storm will ‘kill’ the internet, says space expert

The movement of Earth’s magnetic poles is making solar storm-driven network damage more likely. The answer is to start building shields.

Cybersecurity Goes Private: McAfee and RSA

Good opportunities but challenges ahead for both companies

cloud building security

Implementing secure WANs in the cloud age

Over the past few years most organizations have significantly increased their reliance on the Internet, primarily due to the outsourcing of utility applications like email, unified communications, ERP, CRM, etc., to SaaS providers....

bad security habits

VMware NSX gains traction as a security tool

VMware customers may not be keen on NSX as a networking solution, but they’re discovering it can help them align security with other data center trends.

VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

cybersecurity

IT security’s reality distortion field

IT security has a reality distortion field when it comes to perimeter security. IT needs to create a 'Secure Breach' environment to safeguard data.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

monster

Where the monsters live

Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.

More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

edward snowden

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

information security

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.

Load More