Security

Security | News, how-tos, features, reviews, and videos

ipsecurity protocols network security vpn3

Feds' demand for software standards could boost enterprise security

An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting.

mainframe servers in the cloud

IBM upgrades its Big Iron OS for better cloud, security, and AI support

IBM's latest version of z/OS addresses easier provisioning and embraces Linux applications and utilities.

cso security global breach networking hack invasion infiltrate 5g connected gettyimages 1211443622

What is Network as a Service (NaaS)?

NaaS typically includes integrated hardware, software and licenses delivered in a subscription-based offering.

Ransomware

Ransomware recovery: Plan for it now

Make a disaster-recovery plan to address ransomware attacks, and start with stopping its spread, IDing the variant and getting ready to get restore your files.

internet web browser

Don’t let subdomains sink your security

Subdomain takeover is a DNS problem that can hurt the credibility of your organization, and too many enterprises let it continue.

Network World / Cisco Survivors [Slide-00]

10 competitors Cisco just can’t kill off

Try as it might to be all-things-networking to all enterprises, Cisco faces a wily group of rivals with assets that are hard to overcome. Here’s our list of a notable 10.

The open jaws of a spring trap lie in wait. [danger / risk]

Cisco completes purchase of security risk-management firm

Cisco bought Kenna Security to integrate its data-science-driven, security risk-management technology into Cisco's Secure X platform.

network of connections / digital matrix

Department of Defense works to integrate battlefield intel networks

The goal of the DoD'S Joint All-Domain Command and Control (JADC2) initiative is a concept quite familiar to enterprise IT pros: wholly integrated networks that are fast, reliable, flexible, scalable, and secure.

Tech Spotlight   >   Cloud [IFW / Overview]   >   Clouds reflected in a towering modern skyscraper.

The great cloud computing surge

Driven in part by the pandemic, cloud computing adoption has reached new heights. These five articles take a close look at the implications.

A developer / engineer / technician works with servers, wires, and cables in a data center.

Why the cloud will never eat the data center

Even if traditional data-center tasks are all moved to the cloud, there will still be a need for on-site infrastructure that will ultimately require what looks like a traditional data center.

Tech Spotlight   >   The Future of Work [InfoWorld]   >   Developer / virtual code interface overlay

Open-source: Get SLAs to protect network apps with open-source components

Open-source code in commercial network software can mean that when flaws are found by open-source project teams, fixes don’t make it to the commercial products.

ransomware attack

Make sure your laptop backups can handle ransomware

There’s more than one way to backup laptop data, but not all of them can defeat the tricks attackers have designed into ransomware.

Conceptual binary vault security mechanism.

Center for Internet Security: 18 security controls you need

The goal of CIS Controls V8 is to provide practical and specific actions that can spark creation of a better network security environment.

Zero trust Netskope

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks has added products and features to for enterprises looking to a zero-trust protection environment.

digital security concept picture id1185245180

Cisco CEO: There's no enterprise perimeter to defend anymore

At RSA, Cisco announces new features for SecureX, Secure Endpoint, and Umbrella, plus integration between Cisco/Meraki Wi-Fi and Cisco SD-WAN

security threat / hacker / attack

‘FragAttack’ flaws threaten Wi-Fi, but not too seriously

A set of vulnerabilities in Wi-Fi’s basic design offers a long-standing and widespread threat vector, but the probability of compromise remains low.

keys authentication

How does certificate-based authentication work?

The subject that does not have to be scary, but there are a few misunderstandings. Here's a look at how certificate-based authentications actually works.

cso security hack breach identity infiltrate gettyimages 653137674 by solarseven

IBM embraces zero trust with upgraded Cloud Pak service

IBM has broadened the scope of security features in its Cloud Pak for Security bundle, and has partnered with Zscaler for SASE and other enterprise security efforts.

secure data network digital cloud computing cyber security concept picture id1157887211 2

Juniper takes SASE security control to the cloud

Juniper is rolling out Security Director Cloud to provide a central point of management for enterprise security management.

smartbuildings cio

Cisco adds to its Catalyst software stack for back-to-work safety

Cisco expands DNA Spaces location services to Catalyst 9000 switches as workplaces reopen post-COVID.

Load More