NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

GoDaddy Expands Security Options with Sucuri Technology

|

Three months after acquiring Sucuri, GoDaddy rolls out new Website Security offering.

READ MORE

48 Percent of U.S. Companies Using IoT Have Suffered Security Breaches

|

The cost of those breaches ranged from hundreds of thousands to tens of millions of dollars, a recent survey found.

READ MORE

Honda Plant Shut Down by Ransomware Attack

|

Competitors Nissan and Renault were also forced to stop production last month, Reuters reports.

READ MORE

How Tenable Network Security is More Than Just Vulnerability Scanning

|

VIDEO: Amit Yoran, CEO of Tenable discusses his vision for where the security vendor is headed.

READ MORE

NeuVector Releases CIS Compliance Tools for Kubernetes 1.6

|

The company releases new tools to help organizations ensure that their Kubernetes 1.6 container orchestration deployments meet the Center for Internet Security's benchmarks.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Hybrid WAN Services Emerging as a Viable Network Option

Business customers have relied on MPLS–based VPN service as their primary connectivity for their private networking needs for many years now. Ovum now sees an emerging trend of alternatives that can complement or replace MPLS–based VPN services. The growing use of Ethernet, …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Whodunit: The Mystery of the APT

Cybercriminals can be certain about a few things. Most companies store their important data on their networks. Patents, innovative designs, customer information, and confidential data — it's all there. Intellectual property is highly valuable, making it the number one thing …
 
SEE ALL WHITEPAPERS
 
Over a Quarter of Government Computers Run on Outdated Operating Systems

Over a Quarter of Government Computers Run on Outdated Operating Systems

|

The same is true of 15 percent of computers in finance, healthcare and retail.

READ MORE
ZingBox Extends IoT Security Lifeline to Healthcare Organizations

ZingBox Extends IoT Security Lifeline to Healthcare Organizations

|

The company offers healthcare organizations free access to its IoT Guardian security solution in the wake of WannaCry.

READ MORE
Configuration Error Exposes Almost All American Voters' Personal Data

Configuration Error Exposes Almost All American Voters' Personal Data

|

1.1 terabytes of data was left publicly accessible in an unprotected database.

READ MORE
Risk Management Pros Say an IoT Security Incident Could Be Catastrophic

Risk Management Pros Say an IoT Security Incident Could Be Catastrophic

|

Still, just 44 percent say they're able to protect their systems from risky IoT devices.

READ MORE