Network Security

Network Security | News, how-tos, features, reviews, and videos

Password entry

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures.

Injection syringe needle vaccinate

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for...

mobile security stock image padlocked smartphone

DARPA wants to create secure data-sharing tech

Proposals needed to help secure shared data in remote areas on handheld devices

cloud security challenges 2

What to do when your network is wide open

How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?

nup 173075 0006

Donald Trump offers cybersecurity warning: 'No computer is safe'

Donald Trump showed off his IT security credentials at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

Network servers datacenter

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months.

security analytics

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers. One vendor, Darktrace, is using machine learning to detect network threats.

man in suit holding virtual email letter

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually had enforcement mechanisms in place.

hpe hewlett packard enterprise palo alto headquarters office

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.

analytics network monitoring

SIEMs-as-a-service addresses needs of small, midsize enterprises

Traditional security information and event management systems are expensive, require dedicated security staff, and are difficult to set up and manage -- but managed security service providers are stepping in to make SIEMs practical...

japan defense information infrastructure

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.

google brain

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.

illusive networks swift guard

Illusive Networks seeks to slow Swift attackers through deception

Today's savvy bank robbers don't break into vaults looking for gold or diamonds: They're more likely to be hacking networks looking for access to the Swift payment system.

SSL padlock icon security

Performance, management and privacy issues stymie SSL inspections — and the bad guys know it

The technology is there for companies to inspect the SSL traffic going in and out of their networks, but performance, management and privacy concerns combine to hinder its adoption -- allowing cyberattackers to hide their malicious...

colorful neon networking background

Trouble spotted on the network

No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

NASA logo

NASA CIO allows HPE contract to expire, refuses to sign-off on authority to operate

In the wake of continued security problems, NASA's CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in 2011 to address problems with the agency's outdated and insecure...

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

hacking critical infrastructure security

How cyberattacks work [Infographic]

How attackers get in, the tools they use, and how data is stolen.

Snowden: Auction of stolen NSA malware likely political

A public auction of stolen NSA malware may be a warning to the U.S. that blaming Russia for the hack of the Democratic National Committee could have dire consequences, says Edward Snowden, who also famously breached NSA security.

Load More
You Might Also Like