Network Security

Network Security news, trend analysis and opinion

monster

The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.


More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

edward snowden

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

information security

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.

ssl secure browser security lock

How to prevent potential HTTPS URL hijacking

For consumer's, it’s an easy fix to prevent HTTPS URL hijacking, but enterprise customers may need IT’s help to mitigate the risk.

Bugs & Bugs logo

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event

Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.

Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.

Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.

threat intelligence

Cisco flexes its security muscle at Cisco Live

Cisco’s new automated security products help organizations find more threats—and remediate them—faster.

microsoft headquarters

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.

swift security breaches

SWIFT brings in external support as it fights wave of bank hacks

SWIFT is bringing in additional security support after a series of high-profile bank heists and attempted bank heists conducted via its financial transaction network.

Firewall

4 tools for managing firewall rules

Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal.

networking earth

Veriflow raises cash to develop network security toolkit

Veriflow's $8.2 million in Series A funding will help it bring a new approach to network breach and outage detection via mathematical network verification.

Load More