Network Security

Network Security news, trend analysis and opinion

computer ports secure issue
Red wheel barrow filled with money

Cybersecurity skills shortage threatens the mid-market

Organizations with 100 to 999 employees remain understaffed and under-skilled in cybersecurity—and an easy mark for hackers.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

Cybersecurity remains an elusive business priority

Most organizations are increasing cybersecurity spending and elevating cybersecurity issues to the board level but still struggle with the cybersecurity skills shortage.

SOAPA services opportunities abound

Similar to the rise of ERP in the 1990s, we are about to see a cybersecurity services boom around Security Operations and Analytics (SOAPA).

People, process and technology challenges with security operations

Large organizations need to focus on formalizing processes, implementing intelligent security technologies, training staff and modifying the organization.

jolly roger telephone co. telemarketer telemarketing robocall

When phone systems attack

Weaknesses in our nation's 911 network continue to expose themselves, mostly by accident. The latest incident was with the 911 system in Amarillo, Texas.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

The 'new' McAfee

Security veteran McAfee has ample opportunity to prosper again with the right investment and focus.

cloud security

The evolution of data center segmentation

Micro-segmentation, an evolution of network security, lets organizations add granular segmentation policies to their data center transformation strategy.

Micro-segmentation projects span enterprise organizations

Large organizations are dedicating security and IT resources to craft a micro-segmentation strategy for all workloads across internal networks and public clouds.

internet security privacy

Information security in an insecure world

A guide for current and aspiring CTOs about the process of securing your data and platforms and receiving security certification

RIP Raimund Genes, Trend Micro CTO

Raimond Genes, Trend Micro CTO, cybersecurity visionary and an inspiration, is gone but not forgotten.

internet security privacy

The insecurities list: 10 ways to improve cybersecurity

Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users.

Organizations need strategic and proactive threat intelligence programs

Enterprise organizations must move beyond reactive and operational use cases and leverage threat intelligence more aggressively.

Cybersecurity

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Fortinet CISO Philip Quade explains why organizations have to adjust their security strategies to protect critical infrastructure.

alert detection prevent hacker hacking2

Complete security deception includes detection and incident response

Finding a threat solves only part of the problem. A complete security deception solution will also enable better incident response.

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

cloud security skywriting

Cloud security still a work in progress

Cybersecurity professionals admit that they still don’t have the right skills, processes and monitoring capabilities for cloud security. Suggestions?

Load More