Security

Security | News, how-tos, features, reviews, and videos

laptop adrift on a stormy ocean
optus store provided by optus media centre

Access control setting on a virtual display [authentication/privileges]

Software-defined perimeter: What it is and how it works

With strict authentication enforced by microsegmentation, software-defined perimeter can support Zero Trust Network Access.

SD-WAN adoption

Cisco expands its SD-WAN software for wider reach, better security

Cisco SD-WAN software adds encrypted site-to-cloud connectivity; expands its ability to support multi-region fabric deployment, and improves security.

cloud sase graphic

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto's Prisma SASE package now includes more security for SaaS applications and better detection of unknown threats.

data center female it specialist using laptop server farm cloud and picture id1336250828

How to set up DHCP failover on Windows Server

A few tips on how to make sure the DHCP infrastructure issuing IP addresses isn’t a single point of failure.

cso security hack breach identity infiltrate gettyimages 653137674 by solarseven 2400x1600px

Cisco admits hack on IT network, links attacker to LAPSUS$ threat group

Cisco says an employee’s credentials were compromised after an attacker gained control of a personal Google account.

thread weave colorful network web

What is IoT? The internet of things explained

The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare.

restricted zone sign

Government-imposed internet shutdowns impacted 1.9 billion people in first half of 2022

More people were impacted than during the same period late last year, even as the number of internet blackouts reduced from 84 to 72 in the first half of 2022.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

globe network businessman abstract

Network security depends on two foundations you probably don’t have

Before adding more layers to network security, consider the benefits of explicit network permission, backed by AI-driven traffic analysis.

Quantum computing  >  A quantum processor radiates power.

IBM bolsters quantum cryptography for z16 mainframe

IBM adds NIST’s new public-key encryption and digital signatures algorithms to defend against attacks by future quantum computers.

network security lock padlock breach

Are you doing enough to secure your network infrastructure?

Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

A circuit board with CPU / chip displaying glowing binary code.

New speculative execution attack Retbleed impacts Intel and AMD CPUs

Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls.

digital fabric

Juniper upgrades management platform, adds a switch

Juniper has added troubleshooting features to its flagship Mist AI/ML cloud-based management platform and announced the EX4100 Series Ethernet access switch.

zero trust technologies conceptual illustration illustration id1398701432

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

Conceptual image of a network labeled 'Zero Trust.'

5 mistakes to avoid when implementing zero-trust

Don’t get sidetracked by vendor hype, don’t forget the user experience and don’t skip basic security hygiene, experts say

cloud computing picture id1318623693

IBM brings hybrid-cloud app services to z/OS mainframes

Big Blue’s Wazi as a Service can be used to create z/OS infrastructure instances for cloud app testing and development

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

From AI to cloud-native – is your organisation future-ready?

Cisco puts app-performance tools in the cloud

Cisco moves AppDynamics to the cloud, rolls out two security, networking development tools.

Load More