Network Security

Network Security news, trend analysis and opinion

ransomware locked computer stock image cropped

Trump cybersecurity dos and don’ts (Part 2)

President Trump must balance partisan politics with the pragmatic realities of cybersecurity.


security analytics

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers. One vendor, Darktrace, is using machine learning to detect network threats.

Trump cybersecurity dos and don’ts (Part 1)

President-elect Trump could make strong progress on cybersecurity while adhering to his campaign promises.

internet security with lock

How we got our tattered IoT insecurity blanket

Security problems are pervasive on the Internet, and they are being made more acute because of the Internet of Things.

security thinkstock

How to architect the network so IoT devices are secure

New and increased traffic patterns from the Internet of Things create security challenges.

TopSpin Security deploys realistic deceptions to lure and trap attackers

Deception technology can be effective in detecting an attacker as soon as they begin making moves on the network.

analytics network monitoring

SIEMs-as-a-service addresses needs of small, midsize enterprises

Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical...

hpe hewlett packard enterprise palo alto headquarters office

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.

Goodbye SIEM, hello SOAPA

SIEM systems are becoming part of a dynamic and evolving security analytics and operations architecture.

fiber internet ethernet cord networking

‘Complexity’ will halt network upgrades in 2017

Enterprises are foregoing network upgrades because of the cost and complexity of those upgrades, putting security at risk, a Cato Networks study finds.

japan defense information infrastructure

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.

Trump remains frighteningly behind in cybersecurity

Limited vision statement, lack of knowledge and bureaucratic intransigence could increase cyber risk after Trump is inaugurated.

Cybersecurity

Cybersecurity fabric vs. a security platform: Fabric wins

With Security Fabric, Fortinet delivers the required security features to any point, from the endpoint to the cloud, in real time.

Goodbye, NAC. Hello, software-defined perimeter

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years.

data protection

What is the General Data Protection Regulation and why should you care?

Find out how to prepare for new EU legislation on data collection and data protection.

google brain

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.

network monitoring

Ixia’s Flex Tap Secure+ protects against injection breaches

Ixia’s Flex Tap Secure+ can help prevent the accidental or malicious injection of data into the company network.

Trend Micro’s Enterprise Play

Long known for endpoint security, Trend now offers end-to-end cybersecurity solutions for enterprise organizations

data breach thinkstock

How much does a data breach actually cost?

When it comes to measuring the cost of a data breach, size matters. The more records lost, the higher the cost.

Load More