Security

Security | News, how-tos, features, reviews, and videos

10 cloud security breach virtualization wireless
team trust risk gap help assistance challenge

ransomware

'Credible threat': How to protect networks from ransomware

With recent warnings of ransomware attacks targeting US healthcare organizations, this 7-step plan including backup and recovery, network monitoring, and antivirus may help protect your company.

Zero trust Netskope

Survey: Zero Trust benefits remote work during pandemic

Use of Zero Trust networking during Covid-19 increases remote use of personal devices on corporate networks, according to Enterprise Management Associates.

digital transformation man looking up at sky change future forecast by greg rakozy unsplash

Gartner: Top strategic technology trends for 2021

Cybersecurity mesh, AI engineering, and distributed cloud services are among the top trends that Gartner says will shape future enterprise IT operations.

itil tips for implementation lightbulb innovation process strategy iot by ipopba getty

IoT Roundup: Carriers and connectivity fueling Microsoft's IoT expansion, IoT networks getting smarter, and security corner

This month's installment covers the impetus lent to IoT deployments by the ongoing pandemic, some new wrinkles in the security picture, and the possibility of more intelligence at the network edge in the future.

cso security hack breach watch privacy gettyimages 505489710 by marco piunti 2400x1600

IBM expands the role of its hybrid-cloud security package

IBM adds data, threat intelligence and security service to Cloud Pak for Security system.

Binary streams and circuits flow through a secure, locked system.

Juniper upgrades security software with threat intelligence, VPN package

Juniper adds to its Advanced Threat Prevention (ATP) Cloud and releases an in-house VPN offering

U.S. dollar sign circuitry.

Cisco slapped with $1.9 billion judgement in security patent lawsuit

Centripetal Networks sued Cisco for infringing on four security patents related to encrypted traffic and packet filtering.

A security system involves a wall of combination locks on interconnected puzzle pieces and a shield.

VMware highlights security in COVID-era networking

VMware is tackling the challenges of securing distributed enterprise resources with product enhancements including the new Carbon Black Cloud Workload software and upgrades to its SD-WAN and SASE products.

virtual data center servers

VMware plan disaggregates servers, offloads network virtualization and security

At its virtual VMworld 2020 event, the company previewed a new architecture called Project Monterey that goes a long way to meld bare metal servers, graphics processing units (GPUs), field programmable gate arrays (FPGAs), network...

An anonymous hooded figure is surrounded by an abstract network of avatars.

Government cybersecurity agency warns of Windows Server exploit

Rare warning from CISA instructs government agencies to patch a vulnerability in a core authentication component of Active Directory from Windows Server 2008 to Windows Server 2019.

A man with his head in his hands amid abstract security contruct.

Cisco turns out security patches 25 high-threat flaws for IOS, IOS XE

Cisco this week posted 25 security advisories defining 34 vulnerabilities rated high that should be fixed right away

mainframe servers in the cloud

Still not dead: The mainframe hangs on, sustained by Linux and hybrid cloud

The mainframe—Linux alliance turns 20 this month and is proving to be more vital than ever, primarily in the form of Big Iron-based Red Hat OpenShift.

keeping the cloud secure cloud security lock padlock private cloud

What is SASE? A cloud service that marries SD-WAN with security

Secure access service edge is a Gartner model for streamlining network access, improving security, boosting network performance and reducing the number of vendors and devices IT pros have to deal with.

iot internet of things chains security by mf3d getty

IoT roundup: A wide-scale security flaw and energy-sector botnets

Monitoring water treatment using IoT will become $3.5 billion business.

micro segmentation security lock binary network 2400x1600

How the network can support zero trust

Zero trust architecture calls for granting just enough access to network resources so individuals can accomplish their work tasks – nothing more – and the network itself can help.

hacking critical infrastructure security

Cisco urges patching flaws in data-center, SD-WAN gear

Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offerings that customers should deal with now.

network security / secure connections / integrated system of locks

How to tailor SASE to your enterprise

Secure access service edge is a well-defined model, but there are variations that achieve the same ends and give businesses flexibility to meet their larger goals.

iot security

Are newer medical IoT devices less secure than old ones?

Legacy medical IoT devices may lack security features, but newer ones built around commodity components can have a whole different set of vulnerabilities that are better understood by attackers.

Load More