Network Security

Network Security news, analysis, how-to, opinion and video. | CIO

computer ports secure issue
Family in silhouette waving goodbye at airport

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

binary code cityscape speed

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems.

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

threat intelligence secrets sharing

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

RSA Conference Topic: Endpoint Security

Lots of visibility and hype around next-generation endpoint security, suites, EDR, and services at the upcoming security show

Password entry

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

Injection syringe needle vaccinate

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

mobile security stock image padlocked smartphone

DARPA wants to create secure data-sharing tech

Proposals needed to help secure shared data in remote areas on handheld devices

1 bullet

5 reasons why Web gateways aren’t bulletproof

Like the threat landscape itself, web gateways have changed over the years. Today, web gateways do much more than enforce regulatory compliance and HR policies – organizations rely on web gateways to thwart internet-borne threats....

cloud security challenges 2

What to do when your network is wide open

How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

nup 173075 0006

Donald Trump offers cybersecurity warning: 'No computer is safe'

Donald Trump showed off his IT security credentials at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

Load More