Security

Security | News, how-tos, features, reviews, and videos

sd-wan options

Survey finds SD-WANs are hot, but satisfaction with telcos is not

A recent survey of over 400 IT executives by Cato Networks found that legacy telcos might be on the outside looking in for SD-WANs.

network security / network traffic scanning

Study: Most enterprise IoT transactions are unencrypted

A Zscaler report finds 91.5% of IoT communications within enterprises are in plaintext and so susceptible to interference.

3 types of malware computer virus trojan horse  worm

Microsoft issues fixes for non-supported versions of Windows Server

Critical vulnerability force Microsoft to patch versions of Windows Server and desktops that are long out of support.

iot security tablet conference digital

Extreme addresses networked-IoT security

ExtremeAI security app features machine learning technology that can understand typical behavior of IoT devices and automatically trigger alerts when endpoints act in unusual or unexpected ways

intel cpu background

4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds

Red Hat issued a security advisory on recently disclosed CVEs (common vulnerabilities and exposures) in Intel microprocessors.

Shimizu Island, El Nido, Palawan, Philippines, Southeast Asia

Cisco adds AMP to SD-WAN for ISR/ASR routers

Cisco SD-WAN now sports Advanced Malware Protection on its popular edge routers, adding to their routing, segmentation, security, policy and orchestration capabilities.

digital security concept > lock / keyhole / circuits / network connections

Cisco releases a critical security patch for a virtualized automation tool

Cisco has released a software patch for a critical vulnerability in software used to control large virtual environments.

iot security startups hot highlights planets rocket lock security

10 Hot IoT security startups to watch

With the internet of things growing unchecked, entrepreneurs are working to build security systems that can protect IoT infrastructure and the data it gathers. Here’s a look at 10 of them.

broken lock amid binary code and circuits

Cisco issues critical security warning for Nexus data-center switches

Cisco released 40 security advisories around Nexus switches, Firepower firewalls and more

nw how to shop for enterprise firewall shopping cart

How to shop for enterprise firewalls

Performance, form factors, and automation capabilities are key considerations when choosing a next-generation firewall (NGFW).

ipv6 casb cloud access broker secured public cloud

Does your cloud-access security broker support IPv6? It should.

Knowingly or not, enterprises employ IPv6 for many of their internet connections, and that means CASBs should support the protocol, too, in order to enforce policies on all customer traffic. Here's how major CASBs stack up.

A computer monitor displays code and a pixelated skull.

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities.  Cisco Talos security researchers, who...

compromised data / security breach / vulnerability

Cisco warns WLAN controller, 9000 series router and IOS/XE users to patch urgent security holes

Cisco says unpatched vulnerabilities could lead to DoS attacks, arbitrary code execution, take-over of devices.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems

broken chain metal link breach security

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

corn kernels

How to quickly deploy, run Linux applications as unikernels

Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.

firewall network security lock padlock cyber security

Meta Networks builds user security into its Network-as-a-Service

Meta Networks has a unique approach to the security of its Network-as-a-Service. A tight security perimeter is built around every user and the specific resources each person needs to access.

ipsecurity protocols network security vpn

Russia demands access to VPN providers’ servers

10 VPN service providers have been ordered to link their servers in Russia to the state censorship agency by April 26

woman with hands over face mistake oops embarrassed shy by marisa9 getty

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

Cisco is issuing 17 new fixes for security problems with IOS and IOS/XE software that runs most of its routers and switches, while it has no patch yet to replace flawed patches to RV320 and RV 325 routers.

Load More