Security

Security | News, how-tos, features, reviews, and videos

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

hacker presence on a network

Cisco issues firewall, SD-WAN security warnings

The warning about Cisco Firepower management software is rated critical among 26 other less urgent security advisories it issued.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Windows Server vulnerability disclosed by NSA; don’t wait to patch

The National Security Agency warns the Windows vulnerability allows attackers to evade protections and deliver executable code while appearing as legitimate entities.

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

network variables + dynamics / digital transformation

How to deal with the impact of digital transformation on networks

To unleash the promise of digital transformation, businesses need to embrace automation and software-defined networking as well as improve security.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Cisco issues critical security warnings its Data Center Network Manager

Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

ipsecurity protocols network security vpn2

Recent VPN hacks reveal transparency issues within the industry and its supply chain

It’s time VPN vendors start minding their own kitchen before they burn the whole house down.

iot security tablet horizontal primary insider pro IDG

IoT security: IT's biggest headache

The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models – and it also brings unprecedented security challenges.

Internet of Things (IoT) / security alert / wireless network management

Blockchain/IoT integration accelerates, hits a 'sweet spot'

IoT and blockchain may be a natural fit, but it will still take five to 10 years before kinks are worked out and the two technologies can reach their full potential, according to Gartner.

Staring from a peak over cloud-covered landscape below  >  Mount Taranaki, New Zealand

What’s hot for Cisco in 2020

Experts expect that Cisco will focus on building-out cloud, SD-WAN and security in 2020.

cyber security abstract wall of locks padlocks

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where...

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

IT certifications and training center

Certifications show that you’re committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

secure system / network security policy management

IBM aims at hybrid cloud, enterprise security

IBM Cloud Pak for Security features open-source Red Hat technology for hunting threats and automation to speed response to cyberattacks

Fortinet CEO: Network and security technologies give rise to security-driven networking

A conversation about the future of network security with Fortinet CEO Ken Xie

supply chain / virtual network of connections

IoT in 2020: The awkward teenage years

The internet of things will see more growth in 2020, along with more growing pains - security, lack of complete solutions

20151027 red hat logo

Red Hat Responds to Zombieload v2

Red Hat calls for updating Linux software to address Intel processor flaws that can lead to data-theft exploits

nordvpn

Get 70% off NordVPN Virtual Private Network Service + 3 months free - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click...

Load More