Security

Security | News, how-tos, features, reviews, and videos

access control / authentication / privileges / security / key

IT pros need to weigh in on that ‘sassy’ security model

The secure-access service edge (SASE) model developed by Gartner ties into SD-WAN, edge computing and SD-Branch, so it warrants attention from networking teams.

abstract internet network cyber security concept picture id1072278762

Cisco software fortifies industrial IoT security

Cisco security architecture learns customer IIoT environment, keeps watch for anomalies

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

hacker presence on a network

Cisco issues firewall, SD-WAN security warnings

The warning about Cisco Firepower management software is rated critical among 26 other less urgent security advisories it issued.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Windows Server vulnerability disclosed by NSA; don’t wait to patch

The National Security Agency warns the Windows vulnerability allows attackers to evade protections and deliver executable code while appearing as legitimate entities.

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

network variables + dynamics / digital transformation

How to deal with the impact of digital transformation on networks

To unleash the promise of digital transformation, businesses need to embrace automation and software-defined networking as well as improve security.

Digital Transformation [DX]  >  dandelion seeds blown by a virtual wind of change

The state of digital transformation in 2020

The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Cisco issues critical security warnings its Data Center Network Manager

Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

ipsecurity protocols network security vpn2

Recent VPN hacks reveal transparency issues within the industry and its supply chain

It’s time VPN vendors start minding their own kitchen before they burn the whole house down.

iot security tablet horizontal primary insider pro IDG

IoT security: IT's biggest headache

The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models – and it also brings unprecedented security challenges.

Internet of Things (IoT) / security alert / wireless network management

Blockchain/IoT integration accelerates, hits a 'sweet spot'

IoT and blockchain may be a natural fit, but it will still take five to 10 years before kinks are worked out and the two technologies can reach their full potential, according to Gartner.

Staring from a peak over cloud-covered landscape below  >  Mount Taranaki, New Zealand

What’s hot for Cisco in 2020

Experts expect that Cisco will focus on building-out cloud, SD-WAN and security in 2020.

cyber security abstract wall of locks padlocks

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where...

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

IT certifications and training center

Certifications show that you’re committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

secure system / network security policy management

IBM aims at hybrid cloud, enterprise security

IBM Cloud Pak for Security features open-source Red Hat technology for hunting threats and automation to speed response to cyberattacks

Fortinet CEO: Network and security technologies give rise to security-driven networking

A conversation about the future of network security with Fortinet CEO Ken Xie

Load More