Security

Security | News, how-tos, features, reviews, and videos

keeping the cloud secure cloud security lock padlock private cloud
iot internet of things chains security by mf3d getty

micro segmentation security lock binary network 2400x1600

How the network can support zero trust

Zero trust architecture calls for granting just enough access to network resources so individuals can accomplish their work tasks – nothing more – and the network itself can help.

hacking critical infrastructure security

Cisco urges patching flaws in data-center, SD-WAN gear

Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offerings that customers should deal with now.

network security / secure connections / integrated system of locks

How to tailor SASE to your enterprise

Secure access service edge is a well-defined model, but there are variations that achieve the same ends and give businesses flexibility to meet their larger goals.

iot security

Are newer medical IoT devices less secure than old ones?

Legacy medical IoT devices may lack security features, but newer ones built around commodity components can have a whole different set of vulnerabilities that are better understood by attackers.

Unreal Engine 5

Counterfeit Cisco switches raise network security alarms

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical...

Lock + key securing abstract data with a Windows logo overlay.

Juniper aligns its security portfolio with the SASE model

Juniper joins VMware, Cisco and many others in chasing edge security customers

network security / network traffic scanning

Ripple20 TCP/IP flaws can be patched but still threaten IoT devices

A serious security flaw in a TCP/IP library used by thousands upon thousands of IoT devices remains difficult to address even though a fix exists.

iot security

Microsoft is buying CyberX to bolster its Azure IoT security

Azure IoT users can look for additional security and monitoring capabilities as Microsoft announces plans to buy CyberX

CSO > Security mechanisms vs. fiery threats

Machine learning in Palo Alto firewalls adds new protection for IoT, containers

With machine learning added to Palo Alto Networks' PAN-OS firewall operating system, the firewalls are better equipped to defend IoT devices and containers, whether on-prem or in the cloud.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

nw iot news internet of things smart city smart home5

IoT takes aim at social distancing

How IoT technology can help enforce social-distancing rules by monitoring occupancy in workspaces.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cisco issues fixes for numerous iOS XE, industrial router vulnerabilities

Cisco issued 23 Security Advisories that describe 25 exposures in its IOS and IOS XE systems

networking model

Cisco takes aim at supporting SASE

Cisco will upgrade and integrate access-control, networking and security products to address the goals of secure access service edge

network security lock padlock breach

SASE helps healthcare company pivot to support remote workers

TrialCard rolls out secure access service edge (SASE), which combines SD-WAN capabilities with network security services.

network security lock padlock breach collaboration

How NDR protects your network from cyberthreats

Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

access control / authentication / privileges / security / key

SASE could bolster security for remote workers

COVID-19 has accelerated some companies' plans to adopt secure access service edge (SASE), which combines SD-WAN capabilities with network security services.

healthcare technology / medical data

COVID-19 pandemic ratchets up threats to medical IoT

The coronavirus isn’t just a threat to the health of human beings as cyberattacks against healthcare providers ramp up, experts say.

Load More