Security

Security | News, how-tos, features, reviews, and videos


network security / network traffic scanning

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

To secure industrial IoT, use segmentation instead of firewalls

Firewalls have been the de facto standard for securing internal devices, but the industrial internet of things (IIoT) will change that. Segmentation is the better option in those scenarios.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

tt19 038 thumb
video

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to...

nw hpe networking chief keerti melkote

HPE's vision for the intelligent edge

HPE plans to incorporate segmentation, artificial intelligence and automation into its wired and wireless gear in order to deal with the increased network challenges imposed by IoT and SD-WAN.

tf19 052 thumb
video

FTC fines YouTube, but do fines really encourage change? | TECH(feed)

The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The...

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Flaw found in Supermicro motherboards could allow for remote hijacking

Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

iot security ts

IoT security essentials: Physical, network, software

Internet of things devices present unique security problems due to being spread out, exposed to physical attacks and often lacking processor power.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

csan19 002 thumb
video

What is phishing? Learn how this attack works

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.

iot security tablet conference digital

Top 5 IoT networking security mistakes

IT supplier Brother International shares five of the most common internet-of-things security errors it sees among buyers of its printers and multi-function devices.

hybridcloud

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

VMware will spend $2.7 billion on cloud-application developer Pivotal and $2.1 billion for security vendor Carbon Black - details at next week's VMworld user conference

tf19 049 thumb2
video

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet...

fight shadow

Don’t worry about shadow IT. Shadow IoT is much worse.

Shadow IoT—unauthorized internet of things devices and networks—poses a new level of threats for enterprises.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco: 6 critical security alarms for UCS software, small-biz routers

Cisco finds critical bugs in its Unified communications Director and Director Express software for Big Data packages as well as its Small Business 220 Series Smart Switches.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

Load More