Network Security

Network Security news, trend analysis and opinion

mobile tablet statistics analytics stocks
binoculars search look magnify

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

SIEM remains an enterprise security architecture requirement

Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners.

thermometers cold warm hot temperature

Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The problem is we haven’t developed a good way to measure risk.

The rise of enterprise-class cybersecurity vendors

Cybersecurity professionals say enterprise-class cybersecurity vendors must offer industry experience, support for IT initiatives and a commitment to streamline security operations.

Are next-generation firewalls legacy technology?

While network firewalls continue to anchor security, requirements are changing and next-generation firewall (NGFW) functionality is migrating elsewhere.

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

3 sensitive data hacker phone

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

The move toward enterprise security technology integration

Enterprises want best-of-breed security technology and integration. They'd buy from enterprise-class cybersecurity vendors—if they knew who they were.

Enterprise security technology consolidation

Large organizations are consolidating the number of security vendors they do business with and buying products built for integration.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

dark web hacker tablet malware

Cyber crime as a service forces changes in information security

The advent of cyber crime as a service means professional hackers are behind the keyboard, and organizations must change their approach information security.

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage demands that new cybersecurity technologies must be built for ease of deployment, ease of use, and rapid ROI.

human weak link cybersecurity primary

Systemic cybersecurity crisis looms

Executive perception that security is just another cost, implementing bare bones security measures and growing threats could lead to a cybersecurity crisis.

board of directors

How CISOs should address their boards about security

CISOs can't wait until after a breach to talk with their board of directors. They must have regular discussions to ensure they're on the same page on security priorities.

Load More