Network Security

Network Security | News, how-tos, features, reviews, and videos

programmer devops certification skills code data scientist student by fatos bytyqi unsplash

internet tubes

Internet exchange points team up to bring better MANRS to the internet

Enterprises stand to benefit from ISOC's latest campaign to get IXPs to clean up internet routing security

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

iPhone security / unlocking, hacking or breaking into iPhone

Improve end user device security and embrace the future via the cloud

Cloud has reshaped the client/server model. Are you evolving your architecture to suit?

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

03 emm

Not your father's cybersecurity

Managing mobile devices in a threat-based environment.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

cybersecurityshutterstock 380217166

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers will find ways to break into their systems. Companies are combining new and old methods to thwart the bad guys.

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany.

1 gap

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

Load More