Network Security

Network Security news, trend analysis and opinion

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

cybersecurity

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

monster

Where the monsters live

Tech monsters—threats to the security of our networks, computers, devices and privacy—live seemingly everywhere.

The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.

More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

edward snowden

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

risk reward ts

RiskSense lands $7M for assessment service

RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire...

information security

Your next 10 security pain points

New security issues that companies need to pay attention to include container technology, data loss prevention, regulatory compliance and skills development.

CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.

ssl secure browser security lock

How to prevent potential HTTPS URL hijacking

For consumer's, it’s an easy fix to prevent HTTPS URL hijacking, but enterprise customers may need IT’s help to mitigate the risk.

Bugs & Bugs logo

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event

Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.

Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.

Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.

threat intelligence

Cisco flexes its security muscle at Cisco Live

Cisco’s new automated security products help organizations find more threats—and remediate them—faster.

Load More