Security

Security | News, how-tos, features, reviews, and videos

gentoo penguins

The aftermath of the Gentoo GitHub hack

A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about.

sacramento california state house

While no one was looking, California passed its own GDPR

The California Consumer Privacy Act of 2018 is similar to the EU's GDPR. Companies that hold data on more than 50,000 people and do business in California must comply.

network security locks and cables

Pulse Secure VPN enhanced to better support hybrid IT environments

Thanks to more than 100 enhancements, Pulse Connect Secure can better support BYOD and hybrid IT environments where applications are in the data center and in the cloud.

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

fighter knight sword shield battle protect getty henry hustava unsplash 2

Microsoft adds resiliency, redundancy, security to Windows Server 2019

Windows Server 2019 upgrades enable greater scalability and more reliable recovery from outages for Shielded Virtual Machines.

lock binary circuits

Automation critical to scalable network security

With Tufin Orchestration Suite R18-1, Cisco Firepower customers can make changes and update all the firewalls in minutes instead of having to touch each box one at a time.

red padlock cybersecurity threat ransomeware

Supermicro is the latest hardware vendor with a security issue

Vulnerabilities in Supermicro server firmware require skill to exploit, but if they are, attackers have as much control as if they gained physical access to the system.

Explosion

What happens if IoT security doesn’t get solved?

A new Bain & Company report says security concerns are slowing IoT adoption. Is this problem fixable — and what if it isn’t?

sdn control

SDNs and NFV are complementary and core components of modernized networks

Software-defined networking and network functions virtualization both untie tasks and functions from hardware and provide agility, one for the network itself, the other for network services.

network security digital internet firewall binary code

Cato Networks adds threat hunting to its Network as a Service

Security is a key benefit of using cloud-based networking services. And Cato Networks is kicking it up a notch by adding threat hunting as a service to its cloud network.

Google Data Center

Study shows admins are doing a terrible job of patching servers

Three-quarters of examined open-source servers have unpatched exploits.

linux security commands penguins code

22 essential Linux security commands

If you're looking after the security of Linux systems, these are the commands you must know.

cloud

Asigra evolves backup/recovery to address security, compliance needs

Asigra announced a new version of its backup and recovery software that addresses the risks posed by ransomware and non-compliance with Article 17 of the EU’s GDPR.

cwan 011 blockchain
video

What is blockchain technology?

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago....

chuck robbins cisco ceo

Cisco CEO trumpets Catalyst 9K advances, software business success

CEO Chuck Robbins talks about the shift to subscriptions for Cisco services, the company's cloud strategy, intent-based networking

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

template c100.00 09 18 18.still001
video

Get a hands-on, inside look at the dark web | Salted Hash Ep 25

Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.

template c100.00 02 22 03.still001
video

Can AI help bridge the IT security skills gap? | Salted Hash Ep 27

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to...

security risks in the IoT [internet of things] network

The Enterprise of Thing's troubling lack of security

Enterprise deployment of IoT devices brings a unique requirement to enterprise security that is distinct from normal end points and data centers. Here are three strategies to address it.

Network World / Cisco Survivors [Slide-00]

10 competitors Cisco just can't kill off

With such a broad array of products and backed by vast financial resources, Cisco faces challenges on all fronts, making it possible for other behemoths and even some small competitors to persist.

Load More