Security

Security | News, how-tos, features, reviews, and videos

cisco logo fit
From AI to cloud-native – is your organisation future-ready?

Data matrix networking connections system

Cisco moves Catalyst, Nexus management to the cloud

Cisco is adding a cloud-based option to its on premises management for its Catalyst networking and Nexus data-center gear.

Cybersecurity

RSA: Intel reference design to accelerate SASE, other security tasks

Intel says its reference design will enable accelerator cards to offload security processing from server CPUs without requiring more rack space.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

12 zero trust

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Vendors are offering cloud-based services that support the ZTNA framework for VPN replacement and access control policy enforcement

wireless security vulnerability

6G cellular doesn’t exist, but it can be hacked

Academic researchers have found a way to eavesdrop on 6G wireless transmissions using common, inexpensive, off-the-shelf components.

5G mobile wireless network

U.S. government proposals spell out 5G security advancements

A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks.

secured vpn tunnel

VPNs can complement SASE

New protocols help keep VPNs relevant in the face of secure access service edge and zero-trust network access.

2 linux malware scarier

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

New Linux-based ransomware targets VMware servers

Cheerscript plants double-extortion malware on ESXi servers.

Microsoft logo

Microsoft security vulnerabilities drop after five-year rise

While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

network security lock padlock breach

SASE or SSE? Don’t let hype distract from enterprise needs

Not every vendor can deliver full SASE, and that's OK. Not every enterprise wants, needs or can implement it.

network / data center

What is Nmap and why do you need it on your network?

While there are many monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

Most companies understand they need to transition from perimeter-based security to a Zero Trust model. And they understand that they can’t purchase Zero Trust as an off-the-shelf product. Here are eight questions to ask prospective...

cloud sase graphic

Google Cloud boosts open-source security, simplifies zero-trust rollouts

New Google Cloud security services aim to strengthen open-source security, simplify zero-trust adoption, and improve cloud governance.

database data center network security

6 top network security threats and how to beat them

Here's a list of the most insidious external security threats and internal vulnerabilities, and how to successfully protect the network against both

smart city iot digital transformation networking wireless city scape skyline

Intel details IPU roadmap to free up CPUs

Intel unveiled plans for its next-gen infrastructure processing units (IPU) at its inaugural Intel Vision event.

Load More