Network Security

Network Security news, trend analysis and opinion

Cybersecurity

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Fortinet CISO Philip Quade explains why organizations have to adjust their security strategies to protect critical infrastructure.

alert detection prevent hacker hacking2

Complete security deception includes detection and incident response

Finding a threat solves only part of the problem. A complete security deception solution will also enable better incident response.

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

wikileaks

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

google cloud plans primary

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

3 small business security

SD-WAN facilitates security on the WAN

WAN segmentation is valuable in protecting your network from security vulnerabilities. SD-WAN makes it easy.

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

pentest darkday

Rapid7 demystifies penetration testing

A deep dive into penetration testing -- the choices made and some surprising findings

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

iot security

SSL or IPsec: Which is best for IoT network security?

Network-based encryption such as SSL and IPsec can help guard against security threats to IoT gateways and devices. For this writer, IPsec is the better option.

eyeing big data in the cloud

Arista enables visibility at cloud speed

Arista Data ANalyZer (DANZ 2017) provides scalable end-to-end network and application monitoring.

threat intelligence secrets sharing

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

illumio logo

Illumio extends its segmentation to the network and cloud

By extending its Adaptive Security Platform to the network and cloud, Illumio brings together a number of historically discrete segmentation solutions.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

computer virus stock image

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

cloud security skywriting

Dome9 offers multi-cloud security, adds native support for Azure

Organizations use multiple vendors, so Dome9's decision to support different cloud providers in its cloud security platform—including Microsoft Azure—is a smart move.

mobile security stock image padlocked smartphone

DARPA wants to create secure data-sharing tech

Proposals needed to help secure shared data in remote areas on handheld devices

011117bog cisco bug1

‘Found a nasty bug in my (Cisco) ASA this morning’

The above headline on a post to Reddit piqued my interest this afternoon because it was in that site’s section devoted to system administration and those people know a bug when they encounter one.

Load More