Security

Security | News, how-tos, features, reviews, and videos

vmware vmworld sharpen focus

VMware sharpens security focus with vSphere Platinum, ‘adaptive micro-segmentation’

VMware expands its security range with vSphere Platinum -- a new version of its virtualization software that has security integrated into the hypervisor.

network security locks and cables

Security serves as an essential component to growing an enterprise with SD-WAN

Adopting productivity-enhancing applications across the network creates a need for dynamic data protection. What decision makers should understand about the intersection of security and SD-WAN and keeping data not only accessible, but...

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

network security primary2

How to protect your infrastructure from DNS cache poisoning

When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

L1TF

How the L1 Terminal Fault vulnerability affects Linux systems

The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.

network switches ethernet cables

The rise of next-generation network packet brokers

Next-generation network packet brokers enable organizations to be agile and to align their IT strategies with business initiatives.

wannacry ransom screenshot

Chip maker TSMC will lose millions for not patching its computers

Chip-making giant TSMC will lose hundreds of millions of dollars for failing to patch its Windows 7 computers, which were infected by the WannaCry virus.

security breach egg reveal locks binary code hacked

Cisco pays cool $2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

internet connect vlan router
Clear Choice Tests

REVIEW: Best VPN routers for small business

We evaluated five VPN routers suitable for small businesses from Cisco, D-Link, DrayTek, Mikrotik and ZyXEL based on price, features and user friendliness.

smart phone, smart watch, camera, stylus, lens

Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD

Enterprise IT departments are seeing odd echoes of the problems they faced during the early BYOD era in the entrance of IoT technology into the enterprise, where one of the principal threats is the use of consumer-grade (read:...

021315 geekyfriday 1

Geeky ways to celebrate Friday the 13th

This is the last Friday the 13th of 2018 – make the most of it.

sd-wan options

What are the options for securing SD-WAN?

A look at SD-WAN security capabilities and partnerships from vendors, including Aruba, Cisco, Riverbed, and Silver Peak.

gentoo penguins

The aftermath of the Gentoo GitHub hack

A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.

sacramento california state house

While no one was looking, California passed its own GDPR

The California Consumer Privacy Act of 2018 is similar to the EU's GDPR. Companies that hold data on more than 50,000 people and do business in California must comply.

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

fighter knight sword shield battle protect getty henry hustava unsplash 2

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Windows Server 2019 upgrades enable greater scalability and more reliable recovery from outages for Shielded Virtual Machines.

lock binary circuits

Automation critical to scalable network security

With Tufin Orchestration Suite R18-1, Cisco Firepower customers can make changes and update all the firewalls in minutes instead of having to touch each box one at a time.

red padlock cybersecurity threat ransomeware

Supermicro is the latest hardware vendor with a security issue

Vulnerabilities in Supermicro server firmware require skill to exploit, but if they are, attackers have as much control as if they gained physical access to the system.

Explosion

What happens if IoT security doesn’t get solved?

A new Bain & Company report says security concerns are slowing IoT adoption. Is this problem fixable — and what if it isn’t?

Load More