Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

Internet of think with padlock showing security

5 key enterprise IoT security recommendations

The Online Trust Alliance has published a checklist of enterprise IoT security best practices. Ignore its advice at your own risk.

broken lock amid binary code and circuits

One in five serverless apps has a critical security vulnerability

An audit by PureSec found one in five serverless apps has a critical security flaw that would allow attackers to hijack and use the app for malicious purposes.

saas kaboom

Cisco broadens Tetration security delivery with cloud, virtual buying options

Cisco's Tetration-V and Tetration-SaaS give businesses interested in the security-analytics platform the option of a cloud service or software that runs on virtual appliances.

IBM Z mainframe

IBM tweaks its z14 mainframe to make it a better physical fit for the data center

IBM is making rack-mounted versions - ZR1 and Rockhopper II - of its latest z14t mainframe, that are able to securely run containerized software.

cloud computing - connections - laptops

Network-as-a-Service: A modern solution to today’s networking challenges

Cloud migration and mobility are putting huge pressure on networks. Enterprises need a better option, and NaaS delivers, providing network connectivity and security as a service.

the three stooges

What Larry, Moe and Curly can teach us about network security and SD-WAN agility

A recent survey of 712 IT professionals shows that network complexity remains a problem even after deploying SD-WAN.

honeybot

Malicious IoT hackers have a new enemy

A robot called HoneyBot, designed by researchers at Georgia Tech’s School of Electrical and Computer Engineering, can fool bad actors into believing they have compromised an IoT device and send alerts of the attack to hasten defensive...

Mobile phone data privacy.

People are really worried about IoT data privacy and security—and they should be

Despite rising spending on IoT security, consumers and businesses are right to worry about how data will be used and protected.

meltdown spectre

Patches for Meltdown and Spectre aren’t that bad after all

An industry vendor that tested the Meltdown and Spectre patches says one significant area of performance is impacted, and even that is a rare scenario.

penn state university google map 3d

Penn State secures building automation, IoT traffic with microsegmentation

Penn State chose microsegmentation technology from Tempered Networks to isolate and cloak traffic from its smart building systems, which rely on the BACnet communications protocol to share data related to HVAC, lighting, access...

amdryzen

13 flaws found in AMD processors, AMD given little warning

CTS-Labs of Israel claims it found 13 critical vulnerabilities in AMD processors, and gave AMD only 24 hours notice before disclosing them.

SD-WAN

What do ogres, onions and SD-WAN security have in common? Layers!

Aryaka launches Passport, a multi-layered security platform and ecosystem that provides best-of-breed security at every level of an SD-WAN.

meltdown spectre

New Spectre derivative bug haunts Intel processors

Researchers have discovered how to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information. A fix is coming March 16.

cryptocitizen healthcare

What to understand about health care IoT and its security

How the Internet of Things is disrupting the health care market and how we can take steps to secure medical devices.

ddos attack

Memcached servers can be hijacked for massive DDoS attacks

Any Memcached server not behind a firewall is at risk of being hit by a DDoS attack.

bad security habits

Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products

NSS Labs tests data center intrusion prevention systems (DCIPS) from Fortinet, Juniper Networks, McAfee and Trend Micro.

tools and a tablet forming the shape of a house/building

Is the IoT backlash finally here?

After years of worry, the long-anticipated backlash to the changes wrought by the Internet of Things may finally be arriving. That could be a good thing.

salted hash thumbnail final
video

Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

How to test wireless M2M IoT devices for network readiness

Machine-to-machine (M2M) communication is a significant and growing subset of the larger Internet of Things (IoT) movement, so you have to ask, “Is my network ready for machine-to-machine (M2M) devices?” IoT can include vehicles...

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

Load More