Network Security

Network Security news, information, and how-to advice

abstract image of business silhouettes in blurred motion
spring elastic bend slinky stretch

security automation robot protects defends from attack intrusion breach

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

climb mountain scale peaks climber

The hardest part of mountaineering is descending from the summit

Building an information security organization and effective security plan is like planning to climb a mountain. You need to plan for the ascent and descent, and the latter is much more involved and difficult than the former. You...

doors choices decisions

Best of breed: how secure are you, really?

If everyone claims to be the best, how can we rationally choose what we will deploy?

monitoring systems

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a...

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

data scientist analytics cybersecurity

Traditional cyber solutions are the answer when used in the right way

When it comes to cybersecurity, every investment counts.

puzzle solve problem

Getting to the root (cause) of the problem

The security response process is a natural source of feedback for any software security program.

business people conference room collaboration boardroom

Having a boardroom conversation about cybersecurity and material risk

Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture.

woman working on laptop - close focus, bokeh [by Rawpixel - CC0 via Unsplash]

Are your employees unwittingly invalidating your cyber liability insurance?

To prevent unintentional invalidation of their policies, businesses must educate employees on a number of related issues.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

Man framing with hands in front of face to focus

How managers can best communicate the importance of cybersecurity to employees

We must challenge ourselves to think differently about how and what we’re communicating if we want to be successful in making security a priority for our employees.

Nerves can get to you worried anxious fret nervous anxiety

How benchmarking can make your job much less stressful

From better understanding to stronger defense to self-preservation, industry-wide benchmarking data could provide a whole host of benefits to organizations willing to embrace it.

industrial refinery energy plant oil gas

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

Movie preview test pattern

Best security software: How 5 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

eliminate insider threats 1

For true cybersecurity you must know what employees are doing

A look at some options for keeping tabs on your staff and the possible pros and cons.

ddos attack

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

locks on binary code

Why Splunk acquired Phantom

With the purchase of Phantom, SIEM leader Splunk wants to capitalize on market momentum and add to its security operations and analytics platform architecture (SOAPA).

secured network of computers with locks displayed on screens

Why the next generation of security platforms should be autonomous

The benefits of autonomous security.

Load More