Security

Security | News, how-tos, features, reviews, and videos

CSO > Security mechanisms vs. fiery threats

An SD-WAN service that gets around the Great Firewall of China legally

Teridion’s SD-WAN service for China complies with government restrictions on IPSec traffic leaving the country yet supports broadband IPSec WAN interfaces for international businesses with branches in China.

nw iot news internet of things smart city smart home7

IoT roundup: Carriers expand NB-IoT, Congress eyes IoT security …

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

data protection / security / risk management / data privacy / GDPR

How SD-WAN is evolving into Secure Access Service Edge

Secure access service edge (SASE), pronounced 'sassy,' combines elements of SD-WAN and network security into a single cloud-based service. It supports all types of edges, including WAN, mobile, cloud, and edge computing.

distributed / decentralized network connections across the globe

IoT roundup: VMware, Nokia beef up their IoT

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training for federal workers, and a prominent researcher warns of trouble ahead.

employee wellness predictions

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

Gartner’s top strategic predictions for 2020 and beyond is heavily weighted toward the human side of technology

secure system / network security policy management

Cisco issues critical security warning for IOS XE REST API container

This Cisco IOS XE REST API vulnerability could lead to attackers obtaining the token-id of an authenticated user.

product 28970 product shots1

Train to be a certified cyber security professional for just $39

This twelve-course bundle will show you ethical hacking and pen-testing techniques

secure system / network security policy management

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

secure elections / electronic voting / digital election data security / secure voting machines

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

iot internet of things chains security by mf3d getty

IoT roundup: Security holes abound, GE Digital makes noise and more

This week, we look at IoT security holes -- both usual and unusual -- an IIoT player makes a move, and mergers and partnerships worth noting.

compromised data / security breach / vulnerability

Cisco: 13 IOS, IOS XE security flaws you should patch now

Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.

tf19 054 thumb
video

All about U.S. tech antitrust investigations | TECH(feed)

Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering...

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

To secure industrial IoT, use segmentation instead of firewalls

Firewalls have been the de facto standard for securing internal devices, but the industrial internet of things (IIoT) will change that. Segmentation is the better option in those scenarios.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

tt19 038 thumb
video

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to...

nw hpe networking chief keerti melkote

HPE's vision for the intelligent edge

HPE plans to incorporate segmentation, artificial intelligence and automation into its wired and wireless gear in order to deal with the increased network challenges imposed by IoT and SD-WAN.

tf19 052 thumb
video

FTC fines YouTube, but do fines really encourage change? | TECH(feed)

The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The...

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Flaw found in Supermicro motherboards could allow for remote hijacking

Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.

Load More