Security

Security | News, how-tos, features, reviews, and videos

iot security keyboard connected

Protecting the IoT: 3 things you must include in an IoT security plan

For Internet of Things (IoT) implementations to succeed, network and security professionals need to create an IoT security roadmap that includes these three things.

linux security lick

Linux security: Cmd provides visibility, control over user activity

Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

3 patch training update software band aid laptop with virus binary

Cisco warns on HyperFlex security vulnerabilities

Weaknesses in Cisco's HyperFlex hyperconverged data-center gear could allow command-injection exploits.

Chains of binary data.

Edge security: There’s lots of attack surfaces to worry about

Making edge computing safe means applying sound security principles to the unique edge environment.

spinning globe smart city iot skyscrapers city scape internet digital transformation

IoT providers need to take responsibility for performance

To insure the security and privacy of Internet of Things deployments, vendors, service providers and corporate IT practitioners must assume responsibility for the integrity of their IoT networks and the data they handle.

ipsecurity protocols network security vpn2

That VPN may not be as secure as you think

Researchers found some subscription VPN services have programming errors that cause leaks, monitor user traffic, and lack privacy policies — all reasons to set up your own VPN server.

hats

Red Hat announces container flaw CVE-2019-5736

A flaw in runC and Docker may allow access to underlying file systems when SELinux is not enabled.

blue globe world network global transformation connected global connection

SD-WAN creates new security challenges

Security is one of the top concerns of organizations deploying an SD-WAN. Fortinet’s John Maddison explains what the SD-WAN security challenges are and how to address them.

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

network security lock and cables

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

big data code binary tunnel

DARPA explores new computer architectures to fix security between systems

A completely new government-developed computer architecture could ultimately lead to widespread, commercial-oriented data-security fixes as information moves between systems.

IoT / Internet of Things / wireless network devices / mapping connections

Build security into your IoT plan or risk attack

There’s huge potential with the IoT, but security must be built into a company’s plan and not tacked on at the end.

firewall

What is a firewall? How they work and how they fit into enterprise security

Network firewalls were created as the primary perimeter defense for most organizations, but since its creation the technology has spawned many iterations: proxy, stateful, Web app, next-generation that are explained here.

network security lock padlock breach

How SD-WAN can improve your security strategy

SD-WAN introduces new security options, not previously available with legacy networking technologies, that make it easier to manage and secure network traffic.

internet web browser

Batten down the DNS hatches as attackers strike Feds

DHS warns federal agencies of DNS attacks and offers best practices to help mitigate the situation.

cyber security lock padlock firewall code breach password

Cisco patches serious SD-WAN software security holes

Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow and other vulnerabilities.

6 network packet analysis data binary world

Durham County goes Cisco for enterprise network ops and security proficiency

Cisco’s Application Centric Infrastructure (ACI) and DNA Center are now key parts of Durham County, North Carolina’s enterprise growth.

nordvpn

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now.

Internet of Things city superimposed on padlock

Quantum-embedded chips could secure IoT

An unclonable, quantum physics-driven microprocessor might be the solution to securing the Internet of Things.

Load More