Security

Security | News, how-tos, features, reviews, and videos

Encryption  >  Encrypted data / hexadecimal code

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

micro segmentation security lock fingerprint 2400x1600

Why choose microsegmentation? 3 enterprises explain.

As microsegmentation technology evolves, enterprises are taking different paths toward reaching the same goal: unyielding security.

micro segmentation security lock 2400x1600

How microsegmentation architectures differ

Microsegmentation promises to thwart network attackers by curbing their movements and limiting access to enterprise resources. Architecture types include host-agent segmentation, hypervisor segmentation and network segmentation.

stress / headache / frustration / problem / fatigue

Cisco says to patch critical UCS security holes now

Cisco has posted a package of 17 critical security warnings about authentication vulnerabilities in its Unified Computing System that could let attackers break into systems or cause denial of service troubles.

Kali Linux logo / gears / binary data

IBM extends z15 mainframe family, intensifies Linux security

IBM rolled out two new entry level, 19” single-frame, air-cooled platforms, the z15 Model T02 and LinuxONE III Model LT2. The new machines are extensions of the IBM z15 family that Big Blue rolled out in September of last year.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

IoT roundup: Tech companies step up to help fight against COVID-19

This month, we look at some of the ways the IoT sector is helping to combat the spread of the novel coronavirus.

cloud

Palo Alto grows SD-WAN platform by snapping-up CloudGenix for $420M

Palo Alto looks to build up SD-WAN, SASE portfolio take on Cisco, VMware with CloudGenix technology

COVID-19 coronavirus [abstract concept]

Post-coronavirus planning calls for more (not less) investment in tech

The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five – three on the high-end of the vulnerability scale – warnings about security weaknesses in its SD-WAN offerings.

businessman on a rock in a stormy ocean

Coronavirus challenges remote networking

COVID-19 sends IBM, Google, Amazon, AT&T, Cisco, Apple and others scrambling to securely support an enormous rise in teleworkers, and puts stress on remote-access networks.

Coronavirus (COVID-19)

Coronavirus: What companies are ready for our new reality?

One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...

secure system / network security policy management

As networks evolve enterprises need to rethink security

Q&A: John Maddison, executive vice president of products for network security vendor Fortinet, discusses how to deal with network security in the digital era.

IDG Tech Spotlight  >  Containers + Virtualization [ Network World / March 2020 ]

Essential things to know about container networking

Networking is a crucial component in the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts.

Data breach  >  open padlock allowing illicit streaming data collection

Cisco security warnings include firewall holes, Nexus software weaknesses

Cisco details security vulnerability warnings with Firepower firewall (FXOS), Unified Computing System software and Nexus (NX-OS) switch operating system.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cisco goes to the cloud with broad enterprise security service

Cisco describes the new SecureX service as offering an open, cloud-native system that will let customers detect and remediate threats detected across Cisco and third-party products from a single interface.

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper fills out its enterprise security portfolio, integrates support for its Mist wireless customers and gives customers better visibility and control over encrypted traffic threats.

gears orange large efficient automated machine learning automation

5 hot network-automation startups to watch

Automating network processes can head off issues and speed resolution of problems while cutting the workload on IT pros.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Load More