Security

Security | News, how-tos, features, reviews, and videos

network security lock padlock breach
train tracks converge / rails switch / paths merge / convergence / directory traversals

Cloud security threats  >  theft / breach / fraud / phishing

Misconfiguration and vulnerabilities biggest risks in cloud security: Report

About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.

Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

Nvidia targets insider attacks with digital fingerprinting technology

A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.

hottest and coldest outsourcing trends city globe

Pros and cons of managed SASE

Managed SASE can be appealing for enterprises that want a single provider for deployment and management of WAN and security infrastructure, but there can be tradeoffs depending on provider flexibility, platform interoperability, and...

teams / teamwork / collaboration / discussion / planning / meeting / communication

Survey: NetOps is essential but undervalued in making multi-cloud decisions

For multi-cloud networking to succeed, NetOps must have a seat at the table, but IT leaders need to buy into it.

Quantum computing / security

QuSecure launches quantum-computing based security for endpoints

Quantum-based security with what’s advertised as “frictionless” deployment is now available from QuSecure.

Data center / enterprise networking

Remote.it takes steps toward zero trust with 'single line of code' provisioning

New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it’s network management platform.

Computerworld Tech Forecast 2017 - Hottest Tech Skills for 2017

What to expect from SASE certifications

SASE certification options are expanding, with Palo Alto joining Cato Networks, Netskope and Versa Networks. Are they worth the effort?

it as a product box package hand with product technology nodes primary

8 hot networking technologies for 2023

Innovative technologies designed to make networks faster, smarter and more secure

170227 mwc 02756

Intel boosts VM security, guards against stack attacks in new Xeon release

Intel’s TDX framework gains a new capability, and a “shadow stack” in Xeon’s fourth generation aims to knock out a dangerous cyberattack method.

screen shot remote worker

Work from home is here to stay, so how should IT adjust?

WFH strategy should cover the basics of performance and security, but also extend to ergonomics, online meeting etiquette and data retention

binary code flows around a corporate structure / cybersecurity / technology companies

Former VMware exec Gillis resurfaces to run Cisco security business (again)

Tom Gillis, who left VMware in December, is expected to drive growth in Cisco's cloud, AI and end-to-end security initiatives.

businessman looking through binoculars future vision prediction

Looking ahead to the network technologies of 2023

Virtual networking will drive NaaS evolution, and cloud-hosted security options will explode.

2022 robot future shutterstock 2084251795

The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security...

zero trust security model secured network picture id1313494602

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a security strategy (not a product) based on the idea that devices and users are considered untrusted until they can be authenticated

data center female it specialist using laptop server farm cloud and picture id1336250828

Data center networking trends to watch for 2023

Hybrid and multicloud initiatives are driving changes in data center networks, including new security rollouts, greater automation, and evolving netops strategies.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

F5 expands security portfolio with App Infrastructure Protection

AIP goes one step further than API security and provides telemetry collection and intrusion detection for cloud-native workloads.

Ransomware  >  A coin-operated lock ransoming an encrypted system.

Ransomware: It’s coming for your backup servers

Compromised backup servers can thwart efforts to restore damage done by ransomware and give attackers the chance to extort payments in exchange for keeping sensitive stolen data secret.

istock 1153428651

Top 10 Best Residential Proxy Service Providers

Several residential proxy providers claim to provide the ultimate security for your web activities and enable you to browse anonymously. Get the best value for money with our list of the top ten best residential proxy service...

Load More