Security

Security | News, how-tos, features, reviews, and videos

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160
iot security

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

Palo Alto grows cloud security portfolio with new Prisma release, Bridgecrew buy

Palo Alto bolsters machine learning, security application development, and licensing flexibility with its recent moves.

Data matrix networking connections system

How COVID-19 is shaping enterprise networking

The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools. "One...

Tech Spotlight   >   The Future of Work [Overview]   >   A crystal ball for peering into the future.

The future of work: Coming sooner than you think

What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.

securitybackground

Cisco AppDynamics software melds security, application management

Cisco Secure Application combines security capabilities with application performance data to simplify vulnerability management.

Zero trust Netskope

Arista embraces segmentation as part of its zero-trust security

Arista expands its Macro-Segmentation Service (MSS) to include MSS-Group, software that enables creation of logically assigned security groupings.

Conceptual cybersecurity system locks down a network of interconnected elements and code.

Cisco tags critical security holes in SD-WAN software

Cisco has noted and fixed two “critical” and a number of “high” degree vulnerabilities in its SD-WAN software portfolio.

United States Capitol Building / Congress / legislation in a digital landscape

Lessons that insurrection selfies hold for legitimate enterprises

While electronic metadata is helping law enforcement track those who assaulted Congress, existence of that data should be noted by businesses concerned about privacy.

Access control setting on a virtual display [authentication/privileges]

Wi-Fi: How to deploy 802.1x authentication using WPA3-Enterprise

Wi-Fi Protected Access 3 can provide authentication with enhanced security.

trojan horse malware virus binary by v graphix getty

SolarWinds roundup: Fixes, new bad actors, and what the company knew

A roundup of events from what is emerging as the biggest security breech ever.

sd-wan

SASE check list: 7 key evaluation criteria

Not all SASE providers are created equal, and here's how IT decision makers can examine their options and choose the best fit.

Hacking stealing password data

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.

trojan horse malware virus binary by v graphix getty

Trojan in SolarWinds security has far-reaching impact

With many government agencies and almost all of the Fortune 500 as customers, the SolarWinds breach is very wide-ranging and very dangerous.

Russian hammer and sickle / binary code

SolarWinds attack explained: And why it was so hard to detect

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

An anonymous hooded laptop user is surrounded by binary code and graphed data. [security threat]

Zero trust planning: Key factors for IT pros to consider

Rolling out effective zero-trust network access calls for coordinating IT and security teams, data discovery, network segmentation.

Cisco sign

Cisco gains container security with Banzai Cloud buy

Banzai deal follows Cisco's acquisition of cloud-native security startup Portshift.

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

Palo Alto cloud service prevents distributed enterprise data loss

Palo Alto’s Enterprise Data Loss Prevention service will help protect intellectual property

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

Secure access services edge is a young, cloud-based architecture that shows promise, but the elements that make it up differ depending on who’s selling it.

team trust risk gap help assistance challenge

Cisco fortifies and simplifies its security portfolio with eye toward cloud, zero trust

Cisco expands its SecureX integrated security platform, which has gained 11,000 customers since June, and streamlines its renamed Cisco Secure portfolio.

Load More