Network Security

Network Security news, analysis, how-to, opinion and video. | CIO

nordvpn
cybersecurityshutterstock 380217166

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

threat intelligence secrets sharing

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

RSA Conference Topic: Endpoint Security

Lots of visibility and hype around next-generation endpoint security, suites, EDR, and services at the upcoming security show

Password entry

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

Injection syringe needle vaccinate

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

mobile security stock image padlocked smartphone

DARPA wants to create secure data-sharing tech

Proposals needed to help secure shared data in remote areas on handheld devices

Load More