VPNs

VPN | News, how-tos, features, reviews, and videos

Cloud Security Alliance offers ultra-high cloud security plan

The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the...

How to roll your own VPN

With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location

VPN provider CryptoSeal nixes consumer service over legal worries

A San Francisco-based security company will no longer sell a consumer virtual private network (VPN) service, citing an uncertain legal environment that could threaten its users' privacy.

Cisco patches vulnerabilities in some security appliances, switches and routers

Cisco Systems has released security patches for authentication bypass, command execution and denial-of-service vulnerabilities affecting products that use its Adaptive Security Appliance (ASA) software, as well as the Cisco Catalyst...

Facebook networking chief: No more secret ASIC commands

Facebook's head of network operations has great expectations for software defined networking (SDN), though he may not be relying on commercial hardware vendors to bring SDN to the social networking giant's own infrastructure.

Netfix plumbs pirate sites before buying TV shows

Making content choices based on what's popular on pirate sites makes perfect marketing sense to some media watchers

Microsoft's picture-authentication welcomed given password fatigue

But while an alternative for consumers, picture-passwords a poor choice in enterprises because they do not work with Active Directory

NSA Cracks the Internet: This is News?

As I have often said, absolute security is an abstract, theoretical concept. Forget all of the issues inherent in putting your secrets on the Web. If secrets exist anywhere, other than in memory in a human brain, and perhaps even...

NIST subjects draft cybersecurity framework to more public scrutiny

Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better...

Cisco cracks down on security vulnerability

Cisco Systems released security patches for Secure Access Control Server (Secure ACS) for Windows to address a critical vulnerability that could allow unauthenticated attackers to remotely execute arbitrary commands and take control...

New York Times hack highlights weakness in registrar security

Because registrars are the equivalent of a hacker jackpot, they have to be more vigilant about the security of their customers, experts say

VMware adds networking, storage to its virtual data center stack

At the kick-off of its annual VMworld user conference, being held this week in San Francisco, VMware will fill in more layers of its software stack for running its envisioned software defined data center (SDDC).

Chinese hacker group behind New York Times attack returns with updated tools

The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to...

How to roll your own VPN

With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location

Critics urge end of passwords, but alternatives not ready for prime time

FIDO Alliance is one hopeful that Google has joined, but until passwords are replaced security experts suggest using password managers

Foreign VPNs raise the bar against US government spying

Foreign virtual private networks can make snooping more difficult for the U.S. because the service providers are immune from the Patriot Act

Citrix edges VMware, Microsoft in VDI face-off

We compared hosted virtual desktop infrastructure (VDI) products from Microsoft, Citrix, VMware, Oracle and Ericom and came to many conclusions, but the most important one is this: Setting up hosted desktop sessions in a BYOD world is...

BYOD breeds distrust between workers and IT

Nearly a third of U.S. workers distrust company software on their mobile devices

How will cloud, virtualization and SDN complicate future firewall security?

The firewall in decades past was mainly the port-based guardian of the Internet. Now vendors are vying to build so-called "next-generation firewalls" that are "application-aware" because they can monitor and control access based on...

Cyberattacks the greatest threat to nations, say global execs

Business brass and IT pros around the world believe cyber attacks are a greater threat to their countries than a physical attack, a survey released Tuesday by Cyber Ark reveals.

Load More