Security

Security | News, how-tos, features, reviews, and videos

ipsecurity protocols network security vpn3

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

padlock on ethernet cables for secure network

Identity awareness: it’s more than just a packet

Routing must reflect business context.

brain team iot analytics

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

patching against ransomware

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS...

screen shot 2018 09 21 at 10.43.22 am

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

1 network internet connected grid earth power satellite view

ICANN sets plan to reinforce internet DNS security

ICANN has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).

digital transformation devops primary

Visibility is key for devops and the hybrid cloud

Digital transformation and the cloud are integral aspects of innovation and wider business transformation.

1 weakest link broken rusted chain security breach hacked

What to expect when the internet gets a big security upgrade

More secure keys protecting the directory name system (DNS) are ready to deploy, but for those using DNS servers that haven't been upgraded, it could cause problems reaching websites.

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

vmware vmworld sharpen focus

VMware sharpens security focus with vSphere Platinum, ‘adaptive micro-segmentation’

VMware expands its security range with vSphere Platinum -- a new version of its virtualization software that has security integrated into the hypervisor.

template c100.00 06 50 01.still001
video

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

network security locks and cables

Security serves as an essential component to growing an enterprise with SD-WAN

Adopting productivity-enhancing applications across the network creates a need for dynamic data protection. What decision makers should understand about the intersection of security and SD-WAN and keeping data not only accessible, but...

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

network security primary2

How to protect your infrastructure from DNS cache poisoning

When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

L1TF

How the L1 Terminal Fault vulnerability affects Linux systems

The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.

template c100.00 00 44 13.still001
video

Blue Team Village, DEF CON 2018 | Salted Hash Ep 43

Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.

network switches ethernet cables

The rise of next-generation network packet brokers

Next-generation network packet brokers enable organizations to be agile and to align their IT strategies with business initiatives.

Load More