Security

Security | News, how-tos, features, reviews, and videos

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham
p1240491 19

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

network security lock padlock breach

SASE or SSE? Don’t let hype distract from enterprise needs

Not every vendor can deliver full SASE, and that's OK. Not every enterprise wants, needs or can implement it.

network / data center

What is Nmap and why do you need it on your network?

While there are many monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

Most companies understand they need to transition from perimeter-based security to a Zero Trust model. And they understand that they can’t purchase Zero Trust as an off-the-shelf product. Here are eight questions to ask prospective...

cloud sase graphic

Google Cloud boosts open-source security, simplifies zero-trust rollouts

New Google Cloud security services aim to strengthen open-source security, simplify zero-trust adoption, and improve cloud governance.

database data center network security

6 top network security threats and how to beat them

Here's a list of the most insidious external security threats and internal vulnerabilities, and how to successfully protect the network against both

smart city iot digital transformation networking wireless city scape skyline

Intel details IPU roadmap to free up CPUs

Intel unveiled plans for its next-gen infrastructure processing units (IPU) at its inaugural Intel Vision event.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cohesity launches FortKnox to protect data from ransomware attacks

The data management vendor is adding strong data isolation and recovery capabilities with its latest software-as-a-service release, FortKnox.

Leading remote teams  >  A businessman virtually works with a distributed network of teams.

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS), the worst of which could let an attacker escape from the guest virtual machine (VM) to the host machine.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

Data center / enterprise networking

4 networking best practices learned from the Atlassian network outage

Software vendor posts detailed analysis of what went wrong to help others avoid the same fate

A binary mask.

Cisco urges software update to thwart counterfeit switches

Semiconductor material shortages and other supply chain disruptions are contributing to a spike in counterfeit IT gear, Cisco warns.

security system vulnerabilities - a grid of locks with several unlocked

TLS implementation flaws open Aruba and Avaya network switches to RCE attacks

The network switch vulnerabilities are considered critical and could allow attackers to break network segmentation, exfiltrate data, and escape captive portals.

network security / network traffic scanning

Basing network security on IP addressing: Would it be worth it?

Rather than layering security onto networks, the networks and carefully managed authorization policies can hinder attacks, but at an administrative cost.

Four industrial fans on a building

US security agencies warn of threats to industrial, utility control networks

Possible vulnerable devices include Schneider Electric and OMRON controllers and servers that comply with the OPC Unified Architecture.

bike accident / failure / disaster recovery

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) enables enterprises of all sizes to safely backup their data in the cloud and quickly recover from a natural disaster, cyberattack or unplanned outage

cloud network

Cisco SD-WAN software gains broader application access, enhanced analytics

Cisco upgraded its SD-WAN Cloud OnRamp for SaaS service to provide secure connectivity to a wider range of cloud-based apps and greater visibility into network metrics.

Load More