Security

Security | News, how-tos, features, reviews, and videos


gears orange large efficient automated machine learning automation

5 hot network-automation startups to watch

Automating network processes can head off issues and speed resolution of problems while cutting the workload on IT pros.

youtube thumbnails template
video

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

tt20 011 thumb
video

What's the difference between the deep web and the dark web?

We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep...

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Internet of think with padlock showing security

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive.

IDG Tech Spotlight  >  Security  >  Next-generation firewall features organizations should be using

5 firewall features IT pros should know about but probably don’t

As a foundational network defense, firewalls continue to be enhanced with new features, so many that some important get overlooked.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

A man with his head in his hands amid abstract security contruct.

Cisco patches a security glitch affecting routers, switches and phones

Cisco fixes vulnerabilities in its Cisco Discovery Protocol (CDP) that could let remote attackers take over products without any user interaction

youtube thumbnails template
video

How to check your vulnerability to credential dumping

Use these techniques to see if attackers have harvested authentication credentials from your Windows network.

A network of clouds with binary code.

7 best practices for managing a multi-cloud environment

Multi-cloud strategies and hybrid IT environments bring a set of challenges that technology leaders might not have expected.

tt20 010 thumb
video

The problem with mobile and app voting

It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a...

youtube thumbnails template
video

How to better control access to your Windows network

Take stock of how people and devices access your network and block potential avenues of attack.

access control / authentication / privileges / security / key

IT pros need to weigh in on that ‘sassy’ security model

The secure-access service edge (SASE) model developed by Gartner ties into SD-WAN, edge computing and SD-Branch, so it warrants attention from networking teams.

abstract internet network cyber security concept picture id1072278762

Cisco software fortifies industrial IoT security

Cisco security architecture learns customer IIoT environment, keeps watch for anomalies

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

hacker presence on a network

Cisco issues firewall, SD-WAN security warnings

The warning about Cisco Firepower management software is rated critical among 26 other less urgent security advisories it issued.

youtube thumbnails template
video

How to prep for Windows 7, Server 2008 end of life

Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Windows Server vulnerability disclosed by NSA; don’t wait to patch

The National Security Agency warns the Windows vulnerability allows attackers to evade protections and deliver executable code while appearing as legitimate entities.

Load More