Security

Security | News, how-tos, features, reviews, and videos

secure system / network security policy management

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

secure elections / electronic voting / digital election data security / secure voting machines

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

iot internet of things chains security by mf3d getty

IoT roundup: Security holes abound, GE Digital makes noise and more

This week, we look at IoT security holes -- both usual and unusual -- an IIoT player makes a move, and mergers and partnerships worth noting.

compromised data / security breach / vulnerability

Cisco: 13 IOS, IOS XE security flaws you should patch now

Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

To secure industrial IoT, use segmentation instead of firewalls

Firewalls have been the de facto standard for securing internal devices, but the industrial internet of things (IIoT) will change that. Segmentation is the better option in those scenarios.

nw hpe networking chief keerti melkote

HPE's vision for the intelligent edge

HPE plans to incorporate segmentation, artificial intelligence and automation into its wired and wireless gear in order to deal with the increased network challenges imposed by IoT and SD-WAN.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Flaw found in Supermicro motherboards could allow for remote hijacking

Eclypsium discovered a vulnerability in three generations of Supermicro motherboards that could allow an attacker to remotely commandeer the server. A fix is already available.

iot security ts

IoT security essentials: Physical, network, software

Internet of things devices present unique security problems due to being spread out, exposed to physical attacks and often lacking processor power.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

iot security tablet conference digital

Top 5 IoT networking security mistakes

IT supplier Brother International shares five of the most common internet-of-things security errors it sees among buyers of its printers and multi-function devices.

hybridcloud

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

VMware will spend $2.7 billion on cloud-application developer Pivotal and $2.1 billion for security vendor Carbon Black - details at next week's VMworld user conference

tf19 049 thumb2
video

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet...

fight shadow

Don’t worry about shadow IT. Shadow IoT is much worse.

Shadow IoT—unauthorized internet of things devices and networks—poses a new level of threats for enterprises.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco: 6 critical security alarms for UCS software, small-biz routers

Cisco finds critical bugs in its Unified communications Director and Director Express software for Big Data packages as well as its Small Business 220 Series Smart Switches.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

abstract networks and connections

Get ready for the convergence of IT and OT networking and security

Collecting telemetry data from operational networks and passing it to information networks for analysis has its benefits. But this convergence presents big cultural and technology challenges.

distributed / decentralized global network / globe / Africa

How SD-Branch addresses today’s network security concerns

New digital technologies such as IoT at remote locations increase the need to ID devices and monitor network activity. That’s where SD-Branch can help, says Fortinet’s John Maddison.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

Load More