Security

Security | News, how-tos, features, reviews, and videos

Application security  >  Software code + data protected with a lock

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

cisco

Cisco Meraki ups security with new switch, software

Cisco is bringing some of the bells and whistles of it Catalyst environment to Meraki customers with hardware and software to help customers better support and secure distributed network resources.

youtube thumbnails template
video

Boeing's insecure networks threaten security and safety

Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup...

keeping the cloud secure cloud security lock padlock private cloud

VMware amps security with in-house, Carbon Black technology

VMware's Carbon Black platform, along with VMware NSX, VMware Workspace ONE, VMware Secure State and future innovations, will deliver built-in security to networks, endpoints, workloads, identity\ies, cloud and analytics.

CSO > Security mechanisms vs. fiery threats

An SD-WAN service that gets around the Great Firewall of China legally

Teridion’s SD-WAN service for China complies with government restrictions on IPSec traffic leaving the country yet supports broadband IPSec WAN interfaces for international businesses with branches in China.

nw iot news internet of things smart city smart home7

IoT roundup: Carriers expand NB-IoT, Congress eyes IoT security …

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

data protection / security / risk management / data privacy / GDPR

How SD-WAN is evolving into Secure Access Service Edge

Secure access service edge (SASE), pronounced 'sassy,' combines elements of SD-WAN and network security into a single cloud-based service. It supports all types of edges, including WAN, mobile, cloud, and edge computing.

distributed / decentralized network connections across the globe

IoT roundup: VMware, Nokia beef up their IoT

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training for federal workers, and a prominent researcher warns of trouble ahead.

employee wellness predictions

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

Gartner’s top strategic predictions for 2020 and beyond is heavily weighted toward the human side of technology

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

secure system / network security policy management

Cisco issues critical security warning for IOS XE REST API container

This Cisco IOS XE REST API vulnerability could lead to attackers obtaining the token-id of an authenticated user.

tt19 048 thumb
video

Your best defense against insider threats | TECH(talk)

When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...

product 28970 product shots1

Train to be a certified cyber security professional for just $39

This twelve-course bundle will show you ethical hacking and pen-testing techniques

cssg 029 thumb
video

Microsoft’s Windows, Office 365 advice for secure elections

Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

secure system / network security policy management

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

secure elections / electronic voting / digital election data security / secure voting machines

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

Load More