Network Security

Network Security news, trend analysis and opinion

dashboard analytics stats monitoring
veterans fill cybersecurity gap

mobile tablet statistics analytics stocks

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

binoculars search look magnify

Do you know where your data is?

Third-party risk is very real – your company’s reputation may be in your vendor’s hands.

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The problem is we haven’t developed a good way to measure risk.

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

3 sensitive data hacker phone

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

dark web hacker tablet malware

Cyber crime as a service forces changes in information security

The advent of cyber crime as a service means professional hackers are behind the keyboard, and organizations must change their approach information security.

human weak link cybersecurity primary

Systemic cybersecurity crisis looms

Executive perception that security is just another cost, implementing bare bones security measures and growing threats could lead to a cybersecurity crisis.

board of directors

How CISOs should address their boards about security

CISOs can't wait until after a breach to talk with their board of directors. They must have regular discussions to ensure they're on the same page on security priorities.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

Red wheel barrow filled with money

Is your company spending on the right security technologies?

Here are three considerations that can help companies make the right decisions when it comes to investing in security technology.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

death of the office telephone

When phone systems attack

Weaknesses in our nation's 911 network continue to expose themselves, mostly by accident. The latest incident was with the 911 system in Amarillo, Texas.

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

Load More