Network Security

Network Security news, trend analysis and opinion

nordvpn
alert detection prevent hacker hacking2

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

cloud security skywriting

Cloud security still a work in progress

Cybersecurity professionals admit that they still don’t have the right skills, processes and monitoring capabilities for cloud security. Suggestions?

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

Why is incident response automation and orchestration so hot?

Manual processes limit incident response efficiency and effectiveness, driving the need for incident response automation and orchestration.

IBM's position on Security Analytics and Operations (SOAPA), part 2

Marc van Zadelhoff, general manager of IBM’s security division, discusses SOAPA requirements, intelligence and scale.

11 botnet of things

Botnets: Is your network really protected?

Security is taking a backseat as more IoT devices connect to the internet, making it possible for botnets to attack networks.

IBM's position on Security Analytics and Operations (SOAPA)

Marc van Zadelhoff, general manager of IBM’s security division, talks SOAPA market demand and evolution of the architecture.

wikileaks

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Cybersecurity skills shortage holding steady

Nearly half of all organizations report a “problematic shortage” of cybersecurity skills in 2017.

google cloud plans primary

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Security alert overload threatens to bury security teams

Enterprises can’t keep up with security alert volume, struggle to prioritize the right alerts and ignore a large percentage of the security alert total. They need help!

3 small business security

SD-WAN facilitates security on the WAN

WAN segmentation is valuable in protecting your network from security vulnerabilities. SD-WAN makes it easy.

New York State cybersecurity regulations: Who wins?

Encryption, IAM, SIEM and UBA vendors will benefit from New York State's new cybersecurity regulations for financial services organizations.

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

RSA

Breaking through the cybersecurity bubble

At the recent RSA cybersecurity conference, interoperability and cooperation were a common theme, but not everyone is taking it seriously.

In and Around the 2017 RSA Conference

Interesting announcements on cognitive computing, endpoint security, middleware, and threat intelligence

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

Load More