Security

Security | News, how-tos, features, reviews, and videos

Danger / threats  >  storm clouds / lightning

cloud

Palo Alto grows SD-WAN platform buy snapping-up CloudGenix for $420M

Palo Alto looks to build up SD-WAN, SASE portfolio take on Cisco, VMware with CloudGenix technology

COVID-19 coronavirus [abstract concept]

Post-coronavirus planning calls for more (not less) investment in tech

The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five – three on the high-end of the vulnerability scale – warnings about security weaknesses in its SD-WAN offerings.

businessman on a rock in a stormy ocean

Coronavirus challenges remote networking

COVID-19 sends IBM, Google, Amazon, AT&T, Cisco, Apple and others scrambling to securely support an enormous rise in teleworkers, and puts stress on remote-access networks.

Coronavirus (COVID-19)

Coronavirus: What companies are ready for our new reality?

One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...

secure system / network security policy management

As networks evolve enterprises need to rethink security

Q&A: John Maddison, executive vice president of products for network security vendor Fortinet, discusses how to deal with network security in the digital era.

IDG Tech Spotlight  >  Containers + Virtualization [ Network World / March 2020 ]

Essential things to know about container networking

Networking is a crucial component in the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts.

Data breach  >  open padlock allowing illicit streaming data collection

Cisco security warnings include firewall holes, Nexus software weaknesses

Cisco details security vulnerability warnings with Firepower firewall (FXOS), Unified Computing System software and Nexus (NX-OS) switch operating system.

youtube thumbnails template 021020
video

How to fight scripting attacks

Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cisco goes to the cloud with broad enterprise security service

Cisco describes the new SecureX service as offering an open, cloud-native system that will let customers detect and remediate threats detected across Cisco and third-party products from a single interface.

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper fills out its enterprise security portfolio, integrates support for its Mist wireless customers and gives customers better visibility and control over encrypted traffic threats.

youtube thumbnails template 021020
video

How to prevent data loss on your network

Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

youtube thumbnails template
video

Complying with CCPA: Answers to common questions

Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss...

gears orange large efficient automated machine learning automation

5 hot network-automation startups to watch

Automating network processes can head off issues and speed resolution of problems while cutting the workload on IT pros.

youtube thumbnails template
video

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

tt20 011 thumb
video

What's the difference between the deep web and the dark web?

We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep...

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Internet of think with padlock showing security

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive.

Load More