NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

Why Risk Management Matters: Hackers Breach Italy's Biggest Bank Twice in One Year

|

400,000 UniCredit customers' personal information was exposed in two separate incidents.

READ MORE

Capsule8 Goes Cloud-Native and Container-Aware for Threat Prevention and Response

|

Built for production clouds, Capsule8 Protect provides continual threat detection and blocks attacks on containerized environments.

READ MORE

Managing Third Party Risk: Outside Law Firm Exposes Wells Fargo Client Data

|

The data exposed ranges from high net worth clients' financial details to financial advisors' compensation information and client lists.

READ MORE

CrowdStrike Debuts Cybersecurity Search Engine Technology at Black Hat

|

Security vendor debuts a new capability that will accelerate time to resolution for incident investigations.

READ MORE

Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

|

Accenture Security details a new approach to improve incident management and response.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Whodunit: The Mystery of the APT

Cybercriminals can be certain about a few things. Most companies store their important data on their networks. Patents, innovative designs, customer information, and confidential data — it's all there. Intellectual property is highly valuable, making it the number one thing …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Evolve Your Network as Your Business Digitally Transforms

The total number of ransomware samples grew by 127% in 2015. Find out how hybrid connectivity solutions help you stay ahead of the pace of change by keeping your network up and data secure. Evolve your network as your business digitally transforms. Level 3 offers solutions by helping …
 
SEE ALL WHITEPAPERS
 
Intrusion Detection and Prevention Startup Bricata Raises $8 Million

Intrusion Detection and Prevention Startup Bricata Raises $8 Million

|

The company's multi-pronged, AI-enhanced intrusion detection and prevention attracts VC funding.

READ MORE
Six Top CASB Vendors

Six Top CASB Vendors

|

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.

READ MORE
Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

|

Vehicle registration data for every Swedish citizen was exposed -- including those under witness protection.

READ MORE
IBM's X-Force Red Targets IoT Threats

IBM's X-Force Red Targets IoT Threats

|

Big Blue penetration-testing team will help enterprise customers shore up their IoT and connected-car systems.

READ MORE