Security

Security | News, how-tos, features, reviews, and videos

Stack of legal documents with compliance and regulatory stamp

smart cities iot binary skyline city buildings

Quantum-secured network ‘virtually un-hackable’

A U.K.-based broadband supplier has completed a quantum-key distribution (QKD) secured fiber internet link that it says hackers can't penetrate.

021315 geekyfriday 1

Geeky ways to celebrate Friday the 13th

This is the last Friday the 13th of 2018 – make the most of it.

sd-wan options

What are the options for securing SD-WAN?

A look at SD-WAN security capabilities and partnerships from vendors, including Aruba, Cisco, Riverbed, and Silver Peak.

ddos attack

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

network security locks and cables

OPAQ enables total network security from the cloud

OPAQ built a global network infrastructure and embedded enterprise-grade security services that even extend to an organization’s endpoints.

mobile security / unlocked data connections

Protecting iOS against the aLTEr attacks

The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it...

gentoo penguins

The aftermath of the Gentoo GitHub hack

A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.

network security primary2

Networking anomalies

Total network security is nearly impossible. Use anomalies to mitigate the damage.

smart cities iot binary skyline city buildings industrial iot

Identifying the Internet of Things – one device at a time

To securely build and grow an IoT ecosystem, one must have the tools and architectures in place to identify, control and manage their IoT devices. This process begins with establishing a strong identity within each IoT device. Here...

sacramento california state house

While no one was looking, California passed its own GDPR

The California Consumer Privacy Act of 2018 is similar to the EU's GDPR. Companies that hold data on more than 50,000 people and do business in California must comply.

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

fighter knight sword shield battle protect getty henry hustava unsplash 2

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Windows Server 2019 upgrades enable greater scalability and more reliable recovery from outages for Shielded Virtual Machines.

cisco devnet

Cisco CEO Chuck Robbins: Get ready for the network's next act

At Cisco Live, CEO Chuck Robbins outlines Cisco’s vision for the future of networking -- and it’s never been brighter.

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

lock binary circuits

Automation critical to scalable network security

With Tufin Orchestration Suite R18-1, Cisco Firepower customers can make changes and update all the firewalls in minutes instead of having to touch each box one at a time.

Load More