Network Security

Network Security news, trend analysis and opinion

NY State Cybersecurity Regulations: Who Wins?

Encryption, IAM, SIEM, and UBA vendors will benefit with new cybersecurity regulations for financial services organizations in the Empire State

Computer monitor with pixelated locks for security breach

RSA

Breaking through the cybersecurity bubble

At the recent RSA cybersecurity conference, interoperability and cooperation were a common theme, but not everyone is taking it seriously.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

In and Around the 2017 RSA Conference

Interesting announcements on cognitive computing, endpoint security, middleware, and threat intelligence

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

RSA Conference 2017: Security analytics and operations

At the upcoming RSA Conference, expect to see vendors talking about architecture, machine learning, threat intelligence and incident response automation.

iot security

SSL or IPsec: Which is best for IoT network security?

Network-based encryption such as SSL and IPsec can help guard against security threats to IoT gateways and devices. For this writer, IPsec is the better option.

RSA 2017: Anticipating network security chatter

DDoS protection, network security analytics and cloud security will take center stage at RSA 2017.

eyeing big data in the cloud

Arista enables visibility at cloud speed

Arista Data ANalyZer (DANZ 2017) provides scalable end-to-end network and application monitoring.

threat intelligence secrets sharing

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

illumio logo

Illumio extends its segmentation to the network and cloud

By extending its Adaptive Security Platform to the network and cloud, Illumio brings together a number of historically discrete segmentation solutions.

RSA Conference 2017: Endpoint security in the spotlight

Lots of visibility and hype around next-generation endpoint security, suites, EDR and services at the upcoming RSA Security Conference

Cyber security breach attack on monitor with binary code

How to practice cybersecurity (and why it's different from IT security)

Cybersecurity isn’t about one threat or one firewall issue on one computer. It's about zooming out and getting a bigger perspective on what's going on in an IT environment.

cyberattack

6 ways to launch a targeted cyberattack

The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to...

Commuting Chelsea Manning’s sentence was just and proper

The U.S. Army’s dismissal of multiple warning signs and lack of strong security policies and controls were major contributors to criminal activities.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

computer virus stock image

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

Computer monitor with pixelated locks for security breach

3 tips to improve threat detection and incident response

These three security controls are surefire ways to improve threat detection and incident response to hacks and data breaches.

Load More