Security

Security | News, how-tos, features, reviews, and videos

Tech Spotlight   >   Cloud [IFW / Overview]   >   Clouds reflected in a towering modern skyscraper.
A developer / engineer / technician works with servers, wires, and cables in a data center.

Tech Spotlight   >   The Future of Work [InfoWorld]   >   Developer / virtual code interface overlay

Open-source: Get SLAs to protect network apps with open-source components

Open-source code in commercial network software can mean that when flaws are found by open-source project teams, fixes don’t make it to the commercial products.

ransomware attack

Make sure your laptop backups can handle ransomware

There’s more than one way to backup laptop data, but not all of them can defeat the tricks attackers have designed into ransomware.

Conceptual binary vault security mechanism.

Center for Internet Security: 18 security controls you need

The goal of CIS Controls V8 is to provide practical and specific actions that can spark creation of a better network security environment.

Zero trust Netskope

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks has added products and features to for enterprises looking to a zero-trust protection environment.

digital security concept picture id1185245180

Cisco CEO: There's no enterprise perimeter to defend anymore

At RSA, Cisco announces new features for SecureX, Secure Endpoint, and Umbrella, plus integration between Cisco/Meraki Wi-Fi and Cisco SD-WAN

security threat / hacker / attack

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

A set of vulnerabilities in Wi-Fi’s basic design offers a long-standing and widespread threat vector, but the probability of compromise remains low.

keys authentication

How does certificate-based authentication work?

The subject that does not have to be scary, but there are a few misunderstandings. Here's a look at how certificate-based authentications actually works.

cso security hack breach identity infiltrate gettyimages 653137674 by solarseven

IBM embraces zero trust with upgraded Cloud Pak service

IBM has broadened the scope of security features in its Cloud Pak for Security bundle, and has partnered with Zscaler for SASE and other enterprise security efforts.

secure data network digital cloud computing cyber security concept picture id1157887211 2

Juniper takes SASE security control to the cloud

Juniper is rolling out Security Director Cloud to provide a central point of management for enterprise security management.

smartbuildings cio

Cisco adds to its Catalyst software stack for back-to-work safety

Cisco expands DNA Spaces location services to Catalyst 9000 switches as workplaces reopen post-COVID.

8 authentication basics password identity protected security

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.

hack your own wi fi neon wi fi keyboard hacker

Wi-Fi in 2025: It could be watching your every move

The IEEE is working on a standard that could enable Wi-Fi to track you through walls, right down to what you’re typing on the keyboard.

security threat / hacker / attack

Organizations need to patch Pulse Secure VPNs

Vulnerabilities in Pulse Connect Secure VPN software have reportedly been exploited by attackers, some believed linked to China, to compromise networks.

Hard drive in flames.

Backup lessons from a cloud-storage disaster

Organizations that failed to make sure their cloud data was backed up properly learned the consequences the hard way when an OVHcloud data center burned last month.

smart home

VMware bundles support for the branch-of-one workforce

VMware's new Anywhere Workspace packages networking, SASE, cloud security, and access control.

open faucets leaking binary streams of data

Water-authority network upgrade spots problems faster

The need for greater visibility into remote systems helped prompt a large-scale network upgrade for the Albuquerque Bernalillo County Water Utility Authority.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

TCP/IP stack vulnerabilities threaten IoT devices

The latest in a long line of vulnerabilities in a key part of the networking stack threatens a major open-source operating system, printers and medical IoT devices.

internet cyber security picture id476036529

Cisco streamlines, upgrades its SASE bundle

Cisco is making it simpler to buy its SASE offerings, adding passwordless authentication, and helping to customize the package through a SASE channel in its DevNet software-developer community.

Load More