Security

Security | News, how-tos, features, reviews, and videos

smart city iot digital transformation networking wireless city scape skyline

Intel details IPU roadmap to free up CPUs

Intel unveiled plans for its next-gen infrastructure processing units (IPU) at its inaugural Intel Vision event.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cohesity launches FortKnox to protect data from ransomware attacks

The data management vendor is adding strong data isolation and recovery capabilities with its latest software-as-a-service release, FortKnox.

Leading remote teams  >  A businessman virtually works with a distributed network of teams.

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS), the worst of which could let an attacker escape from the guest virtual machine (VM) to the host machine.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

Data center / enterprise networking

4 networking best practices learned from the Atlassian network outage

Software vendor posts detailed analysis of what went wrong to help others avoid the same fate

A binary mask.

Cisco urges software update to thwart counterfeit switches

Semiconductor material shortages and other supply chain disruptions are contributing to a spike in counterfeit IT gear, Cisco warns.

security system vulnerabilities - a grid of locks with several unlocked

TLS implementation flaws open Aruba and Avaya network switches to RCE attacks

The network switch vulnerabilities are considered critical and could allow attackers to break network segmentation, exfiltrate data, and escape captive portals.

network security / network traffic scanning

Basing network security on IP addressing: Would it be worth it?

Rather than layering security onto networks, the networks and carefully managed authorization policies can hinder attacks, but at an administrative cost.

Four industrial fans on a building

US security agencies warn of threats to industrial, utility control networks

Possible vulnerable devices include Schneider Electric and OMRON controllers and servers that comply with the OPC Unified Architecture.

bike accident / failure / disaster recovery

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) enables enterprises of all sizes to safely backup their data in the cloud and quickly recover from a natural disaster, cyberattack or unplanned outage

cloud network

Cisco SD-WAN software gains broader application access, enhanced analytics

Cisco upgraded its SD-WAN Cloud OnRamp for SaaS service to provide secure connectivity to a wider range of cloud-based apps and greater visibility into network metrics.

laptop displaying binary code with bandages on its screen

5 VMware products need patching against serious security vulnerabilities

VMware urges patching Workspace ONE Access and VMware products that include components of VMware Identity Manager.

network security primary2

10 essential Linux tools for network and security pros

These open source security frameworks help enterprises stay one step ahead of attackers by facilitating penetration testing and vulnerability assessments on wired and wireless enterprise networks.

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide...

ibm z16

IBM z16: A mainframe designed for AI, hybrid cloud, security and open source

IBM says its latest mainframe will support AI analytics at scale and security to withstand expected quantum attacks.

digital network security concept picture id1192070289

Fortinet tightens integration of enterprise security, networking controls

Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software.

Binary code / magnifying lens / inspection / analysis

Zero trust requires network visibility

AI and machine-learning techniques are imperative in a zero-trust environment that depends on analysis of the behavior of every device, person, or system using the network.

Red flag warning button [alert / danger / disaster]

CISA warns of attacks against internet-connected UPS devices

Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

abstract arrows direction process magnifying glass search investigate

Use zero trust to fight network technical debt

Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

Load More