Security

Security | News, how-tos, features, reviews, and videos

VMware headquarters

firewall network security lock padlock cyber security

Software-defined perimeter brings trusted access to multi-cloud applications, network resources

Today’s networks are both elastic and permeable. Software-defined perimeter (SDP) technology enables simpler, trusted, and secure access to applications in public or private cloud.

cyber security lock padlock firewall code breach password

VMware firewall takes aim at defending apps in data center, cloud

VMware says its new Service-defined Firewall has gains deep visibility into the hosts and services that generate network traffic via company’s existing NSX network management software, its vSphere hypervisors and AppDefense threat...

abstract data

How blockchain will manage networks

Ethernet networking technology is inherently insecure and hard to manage. To address that, researchers say a blockchain approach to network management is needed.

network security lock padlock breach

Cisco uncorks 26 security patches for switches, firewalls

Cisco is patching holes in software for Nexus 3000, 3500, 7000, 9000 switches and for Firepower 4100 Series next-generation firewall and Firepower 9300 security appliance.

thumb
video

Huawei’s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed)

The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old...

padlock unlocked security hole flaw

Cryptocurrency miners exploit Docker flaw

A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.

intro security vulnerability

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users using a particular wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.

iot security keyboard connected

Protecting the IoT: 3 things you must include in an IoT security plan

For Internet of Things (IoT) implementations to succeed, network and security professionals need to create an IoT security roadmap that includes these three things.

linux security lick

Linux security: Cmd provides visibility, control over user activity

Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

3 patch training update software band aid laptop with virus binary

Cisco warns on HyperFlex security vulnerabilities

Weaknesses in Cisco's HyperFlex hyperconverged data-center gear could allow command-injection exploits.

Chains of binary data.

Edge security: There’s lots of attack surfaces to worry about

Making edge computing safe means applying sound security principles to the unique edge environment.

spinning globe smart city iot skyscrapers city scape internet digital transformation

IoT providers need to take responsibility for performance

To insure the security and privacy of Internet of Things deployments, vendors, service providers and corporate IT practitioners must assume responsibility for the integrity of their IoT networks and the data they handle.

ipsecurity protocols network security vpn2

That VPN may not be as secure as you think

Researchers found some subscription VPN services have programming errors that cause leaks, monitor user traffic, and lack privacy policies — all reasons to set up your own VPN server.

hats

Red Hat announces container flaw CVE-2019-5736

A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.

blue globe world network global transformation connected global connection

SD-WAN creates new security challenges

Security is one of the top concerns of organizations deploying an SD-WAN. Fortinet’s John Maddison explains what the SD-WAN security challenges are and how to address them.

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

network security lock and cables

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

Load More