Security

Security | News, how-tos, features, reviews, and videos

United States Capitol Building / Congress / legislation in a digital landscape

Lessons that insurrection selfies hold for legitimate enterprises

While electronic metadata is helping law enforcement track those who assaulted Congress, existence of that data should be noted by businesses concerned about privacy.

Access control setting on a virtual display [authentication/privileges]

Wi-Fi: How to deploy 802.1x authentication using WPA3-Enterprise

Wi-Fi Protected Access 3 can provide authentication with enhanced security.

trojan horse malware virus binary by v graphix getty

SolarWinds roundup: Fixes, new bad actors, and what the company knew

A roundup of events from what is emerging as the biggest security breech ever.

sd-wan

SASE check list: 7 key evaluation criteria

Not all SASE providers are created equal, and here's how IT decision makers can examine their options and choose the best fit.

Hacking stealing password data

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.

trojan horse malware virus binary by v graphix getty

Trojan in SolarWinds security has far-reaching impact

With many government agencies and almost all of the Fortune 500 as customers, the SolarWinds breach is very wide-ranging and very dangerous.

Russian hammer and sickle / binary code

SolarWinds attack explained: And why it was so hard to detect

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

An anonymous hooded laptop user is surrounded by binary code and graphed data. [security threat]

Zero trust planning: Key factors for IT pros to consider

Rolling out effective zero-trust network access calls for coordinating IT and security teams, data discovery, network segmentation.

Cisco sign

Cisco gains container security with Banzai Cloud buy

Banzai deal follows Cisco's acquisition of cloud-native security startup Portshift.

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

Palo Alto cloud service prevents distributed enterprise data loss

Palo Alto’s Enterprise Data Loss Prevention service will help protect intellectual property

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

Secure access services edge is a young, cloud-based architecture that shows promise, but the elements that make it up differ depending on who’s selling it.

team trust risk gap help assistance challenge

Cisco fortifies and simplifies its security portfolio with eye toward cloud, zero trust

Cisco expands its SecureX integrated security platform, which has gained 11,000 customers since June, and streamlines its renamed Cisco Secure portfolio.

ransomware

'Credible threat': How to protect networks from ransomware

With recent warnings of ransomware attacks targeting US healthcare organizations, this 7-step plan including backup and recovery, network monitoring, and antivirus may help protect your company.

Zero trust Netskope

Survey: Zero Trust benefits remote work during pandemic

Use of Zero Trust networking during Covid-19 increases remote use of personal devices on corporate networks, according to Enterprise Management Associates.

passwords

How to enforce password complexity on Linux

Linux gives you lots of ways to create complexity in passwords that include a lot more than just length, such as mixing upper- and lower-case letters with numerals and punctuation marks along with other restrictions.

digital transformation man looking up at sky change future forecast by greg rakozy unsplash

Gartner: Top strategic technology trends for 2021

Cybersecurity mesh, AI engineering, and distributed cloud services are among the top trends that Gartner says will shape future enterprise IT operations.

itil tips for implementation lightbulb innovation process strategy iot by ipopba getty

IoT Roundup: Carriers and connectivity fueling Microsoft's IoT expansion, IoT networks getting smarter, and security corner

This month's installment covers the impetus lent to IoT deployments by the ongoing pandemic, some new wrinkles in the security picture, and the possibility of more intelligence at the network edge in the future.

cso security hack breach watch privacy gettyimages 505489710 by marco piunti 2400x1600

IBM expands the role of its hybrid-cloud security package

IBM adds data, threat intelligence and security service to Cloud Pak for Security system.

Binary streams and circuits flow through a secure, locked system.

Juniper upgrades security software with threat intelligence, VPN package

Juniper adds to its Advanced Threat Prevention (ATP) Cloud and releases an in-house VPN offering

U.S. dollar sign circuitry.

Cisco slapped with $1.9 billion judgement in security patent lawsuit

Centripetal Networks sued Cisco for infringing on four security patents related to encrypted traffic and packet filtering.

Load More