Security

Security | News, how-tos, features, reviews, and videos

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

corn kernels

How to quickly deploy, run Linux applications as unikernels

Unikernels are a smaller, faster, and more secure option for deploying applications on cloud infrastructure. With NanoVMs OPS, anyone can run a Linux application as a unikernel with no additional coding.

firewall network security lock padlock cyber security

Meta Networks builds user security into its Network-as-a-Service

Meta Networks has a unique approach to the security of its Network-as-a-Service. A tight security perimeter is built around every user and the specific resources each person needs to access.

ipsecurity protocols network security vpn

Russia demands access to VPN providers’ servers

10 VPN service providers have been ordered to link their servers in Russia to the state censorship agency by April 26

woman with hands over face mistake oops embarrassed shy by marisa9 getty

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

Cisco is issuing 17 new fixes for security problems with IOS and IOS/XE software that runs most of its routers and switches, while it has no patch yet to replace flawed patches to RV320 and RV 325 routers.

money salary magnet flying money money magnet by brianajackson getty

Cisco forms VC firm looking to weaponize fledgling technology companies

Decibel, an investment firm focused on early stage funding for enterprise-product startups, will back technologies related to Cisco's core interests.

hack your own wi fi neon wi fi keyboard hacker

How to hack your own Wi-Fi network

Free (or almost free) Wi-Fi penetration testing tools can help you spot potential Wi-Fi security vulnerabilities and figure out ways to protect against them.

iot security keyboard connected

Triton and the new wave of IIoT security threats

Triton malware, which can shut down industrial safety systems, causing damage to facilities and threatening human life, targets the industrial internet of things.

oops mistake wrong problem by revel.stockart getty

Cisco directs high priority patches for IP phone security exposures

Cisco this week advised customers using its 7800 and 8800 series IP phones they should patch a variety of “high” priority vulnerabilities that could lead to denial of service and other security problems.

meet the bristlecone chip googles 72 qubit quantum computer chip

Quantum computing will break your encryption in a few years

Quantum technology is set to make public-key infrastructure obsolete before too long, but it might also keep your data secure.

VMware headquarters

Exec: How SDN, SD-WAN, security fit in VMware's strategy

VMware networking and security chief Tom Gillis looks at competing with Cisco and how the company will bolster NSX and more.

firewall network security lock padlock cyber security

Software-defined perimeter brings trusted access to multi-cloud applications, network resources

Today’s networks are both elastic and permeable. Software-defined perimeter (SDP) technology enables simpler, trusted, and secure access to applications in public or private cloud.

cyber security lock padlock firewall code breach password

VMware firewall takes aim at defending apps in data center, cloud

VMware says its new Service-defined Firewall has gains deep visibility into the hosts and services that generate network traffic via company’s existing NSX network management software, its vSphere hypervisors and AppDefense threat...

abstract data

How blockchain will manage networks

Ethernet networking technology is inherently insecure and hard to manage. To address that, researchers say a blockchain approach to network management is needed.

network security lock padlock breach

Cisco uncorks 26 security patches for switches, firewalls

Cisco is patching holes in software for Nexus 3000, 3500, 7000, 9000 switches and for Firepower 4100 Series next-generation firewall and Firepower 9300 security appliance.

padlock unlocked security hole flaw

Cryptocurrency miners exploit Docker flaw

A container flaw discovered just last month has been exploited by hundreds of attackers, including cryptocurrency miners, cybersecurity company Imperva says.

intro security vulnerability

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users using a particular wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.

iot security keyboard connected

IoT security plans: 3 things you must include

For Internet of Things (IoT) implementations to succeed, network and security professionals need to create an IoT security roadmap that includes these three things.

linux security lick

Linux security: Cmd provides visibility, control over user activity

Cmd helps organizations monitor, authenticate, and block user activity that goes beyond expected Linux system usage.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

Load More