Security

Security | News, how-tos, features, reviews, and videos

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable
internet cyber security picture id476036529

5g 4g wireless wireless network devices

Report: 5G network slicing could leave flaws for bad actors to exploit

Missing security-validation steps in network slicing design pose a risk of serious privacy and security breaches.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cloudflare wants to be your corporate network backbone with centralized management and security

Magic WAN and Magic Firewall aim to simplify linking sites and datacenters while allowing organizations to better enforce security policies.

VMware

VMware bolsters cloud app security with Mesh7 buy

Mesh7's security technology will be combined with VMware's Kubernetes-based Tanzu Service Mesh.

CSO / NW  >  Engineer checking/testing servers

Ransomware: How to make sure backups are ready for a real attack

Avoid paying off ransomware attackers by following these steps to ensure backups can restore infected systems.

CSO > cloud computing / backups / data center / server racks / data transfer

Top enterprise data center trends you need to know

Enterprise data-center pros are embracing cloud services, growing high-speed networks, enabling remote workforces, and adopting automation and AI.

One lock in a series is unlocked / weakness / vulnerability

5 free network-vulnerability scanners

These 5 tools can help automate the detection and remediation of vulnerabilities, and they're available at no cost, and some are upgradeable to more fully featured platforms.

Tech Spotlight   >   Cybersecurity [NW]   >   Cloud network security

WAN challenges steer auto-rental firm to SASE

SASE helps global car-rental company Sixt strengthen its network security architecture and ride out COVID-19 challenges.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Cisco issues 3 critical warnings around ACI, NS-OX security holes

Cisco issued three security advisories rated “critical” for some of its high-end software systems – two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system. The most concerning warning...

iot security

IoT security tips and a cautionary tale

The US government is working toward establishing IoT security guidelines, and a very public dispute about a particular IoT device demonstrates why they are necessary.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

Palo Alto grows cloud security portfolio with new Prisma release, Bridgecrew buy

Palo Alto bolsters machine learning, security application development, and licensing flexibility with its recent moves.

Data matrix networking connections system

How COVID-19 is shaping enterprise networking

The COVID-19 pandemic has influenced the networking arena in a number of ways, including the rise of fully automated remote offices, the need to support a "branch of one," and the growth of new communications software tools. "One...

Tech Spotlight   >   The Future of Work [Overview]   >   A crystal ball for peering into the future.

The future of work: Coming sooner than you think

What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.

securitybackground

Cisco AppDynamics software melds security, application management

Cisco Secure Application combines security capabilities with application performance data to simplify vulnerability management.

Zero trust Netskope

Arista embraces segmentation as part of its zero-trust security

Arista expands its Macro-Segmentation Service (MSS) to include MSS-Group, software that enables creation of logically assigned security groupings.

Conceptual cybersecurity system locks down a network of interconnected elements and code.

Cisco tags critical security holes in SD-WAN software

Cisco has noted and fixed two “critical” and a number of “high” degree vulnerabilities in its SD-WAN software portfolio.

United States Capitol Building / Congress / legislation in a digital landscape

Lessons that insurrection selfies hold for legitimate enterprises

While electronic metadata is helping law enforcement track those who assaulted Congress, existence of that data should be noted by businesses concerned about privacy.

Access control setting on a virtual display [authentication/privileges]

Wi-Fi: How to deploy 802.1x authentication using WPA3-Enterprise

Wi-Fi Protected Access 3 can provide authentication with enhanced security.

Load More