Security

Security | News, how-tos, features, reviews, and videos

networking model
network security lock padlock breach

network security lock padlock breach collaboration

How NDR protects your network from cyberthreats

Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

access control / authentication / privileges / security / key

Enterprises look to SASE to bolster security for remote workers

COVID-19 has accelerated some companies' plans to adopt secure access service edge (SASE), which combines SD-WAN capabilities with network security services.

healthcare technology / medical data

COVID-19 pandemic ratchets up threats to medical IoT

The coronavirus isn’t just a threat to the health of human beings as cyberattacks against healthcare providers ramp up, experts say.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

thread weave colorful network web

What is IoT? The internet of things explained

The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare.

VPN / network security

Cisco, others, shine a light on VPN split-tunneling

Cisco, Microsoft and others play up VPN split-tunneling features to handle growing enterprise remote workload security

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

A globe, centered on the United Kingdom, surrounded by global connections.

Global VPN use exploded in March

The VPN market was forecast to grow, even before COVID-19 caused VPN use to skyrocket.

Danger / threats  >  storm clouds / lightning

UPDATE 4-28: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security...

micro segmentation security lock network 2400x1600

Microsegmentation product snapshots: Edgewise Networks, VMware and ShieldX Networks

Vendors are stepping forward to help enterprises update their infrastructure security to prevent catastrophic intrusions and data thefts. Here's a look at three microsegmentation technology market players, showing what they offer, how...

Encryption  >  Encrypted data / hexadecimal code

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

micro segmentation security lock fingerprint 2400x1600

Why choose microsegmentation? 3 enterprises explain.

As microsegmentation technology evolves, enterprises are taking different paths toward reaching the same goal: unyielding security.

micro segmentation security lock 2400x1600

How microsegmentation architectures differ

Microsegmentation promises to thwart network attackers by curbing their movements and limiting access to enterprise resources. Architecture types include host-agent segmentation, hypervisor segmentation and network segmentation.

stress / headache / frustration / problem / fatigue

Cisco says to patch critical UCS security holes now

Cisco has posted a package of 17 critical security warnings about authentication vulnerabilities in its Unified Computing System that could let attackers break into systems or cause denial of service troubles.

Load More