Security

Security | News, how-tos, features, reviews, and videos

smart cities iot binary skyline city buildings industrial iot

Identifying the Internet of Things – one device at a time

To securely build and grow an IoT ecosystem, one must have the tools and architectures in place to identify, control and manage their IoT devices. This process begins with establishing a strong identity within each IoT device. Here...

sacramento california state house

While no one was looking, California passed its own GDPR

The California Consumer Privacy Act of 2018 is similar to the EU's GDPR. Companies that hold data on more than 50,000 people and do business in California must comply.

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

fighter knight sword shield battle protect getty henry hustava unsplash 2

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Windows Server 2019 upgrades enable greater scalability and more reliable recovery from outages for Shielded Virtual Machines.

cisco devnet

Cisco CEO Chuck Robbins: Get ready for the network's next act

At Cisco Live, CEO Chuck Robbins outlines Cisco’s vision for the future of networking -- and it’s never been brighter.

lock binary circuits

Automation critical to scalable network security

With Tufin Orchestration Suite R18-1, Cisco Firepower customers can make changes and update all the firewalls in minutes instead of having to touch each box one at a time.

red padlock cybersecurity threat ransomeware

Supermicro is the latest hardware vendor with a security issue

Vulnerabilities in Supermicro server firmware require skill to exploit, but if they are, attackers have as much control as if they gained physical access to the system.

Explosion

What happens if IoT security doesn’t get solved?

A new Bain & Company report says security concerns are slowing IoT adoption. Is this problem fixable — and what if it isn’t?

sdn control

SDNs and NFV are complementary and core components of modernized networks

Software-defined networking and network functions virtualization both untie tasks and functions from hardware and provide agility, one for the network itself, the other for network services.

network security digital internet firewall binary code

Cato Networks adds threat hunting to its Network as a Service

Security is a key benefit of using cloud-based networking services. And Cato Networks is kicking it up a notch by adding threat hunting as a service to its cloud network.

Google Data Center

Study shows admins are doing a terrible job of patching servers

Three-quarters of examined open-source servers have unpatched exploits.

linux security commands penguins code

22 essential Linux security commands

If you're looking after the security of Linux systems, these are the commands you must know.

cloud

Asigra evolves backup/recovery to address security, compliance needs

Asigra announced a new version of its backup and recovery software that addresses the risks posed by ransomware and non-compliance with Article 17 of the EU’s GDPR.

window patch repair boarded up

Overcoming kludges to secure web applications

Nothing is easy when applications lay upon multiple kludges of network architecture and flawed protocols. Without adequate safeguards, security results in a hit and miss approach.

chuck robbins cisco ceo

Cisco CEO trumpets Catalyst 9K advances, software business success

CEO Chuck Robbins talks about the shift to subscriptions for Cisco services, the company's cloud strategy, intent-based networking

template c100.00 02 22 03.still001
video

Can AI help bridge the IT security skills gap? | Salted Hash Ep 27

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to...

security risks in the IoT [internet of things] network

The Enterprise of Thing's troubling lack of security

Enterprise deployment of IoT devices brings a unique requirement to enterprise security that is distinct from normal end points and data centers. Here are three strategies to address it.

Network World / Cisco Survivors [Slide-00]

10 competitors Cisco just can't kill off

With such a broad array of products and backed by vast financial resources, Cisco faces challenges on all fronts, making it possible for other behemoths and even some small competitors to persist.

man in network room data center tech troubleshooting

IPSec – A swiss army knife of kludges

One shoe does not fit all when it comes to SD-WAN providers. There are a variety of ways to tunnel user traffic. Stay clear of anyone who hasn't made the right extensions to IPSec.

Load More