NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

Staff Shortage: 85 Percent of Cyber Security Pros Say They Need More People

|

And 70 percent say hiring experienced professionals is a priority, a recent survey found.

READ MORE

IoT Security Startup ZingBox Raises $22 Million

|

Dell lends some funds to the IoT security specialist's latest round of financing.

READ MORE

Webroot Acquires Securecast for Security Awareness Training

|

The company ventures into security training to help businesses educate their employees on the dangers lurking online.

READ MORE

Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

|

And just 48 percent of small to mid-sized organizations think their current password policy is good enough, a recent survey found.

READ MORE

Over a Third of Healthcare IoT Organizations Suffered Cyber Incidents in the Past Year

|

And almost a third said dealing with the risks of legacy connected devices is their greatest cyber security challenge, a recent survey found.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Evolve Your Network as Your Business Digitally Transforms

The total number of ransomware samples grew by 127% in 2015. Find out how hybrid connectivity solutions help you stay ahead of the pace of change by keeping your network up and data secure. Evolve your network as your business digitally transforms. Level 3 offers solutions by helping …

Azure Marketplace Labs: Cisco on Azure

Take advantage of this on–demand webinar to learn how to deploy the Cisco Cloud Services Router (CSR) 1000V in two Microsoft Azure environments. Additionally, our cloud expert will teach you to set up a site–to–site VPN, establishing a clear link between geographically …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …
 
SEE ALL WHITEPAPERS
 
The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

|

By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.

READ MORE
Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

|

The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.

READ MORE
The Importance of Effective Incident Response: the HBO Breach Expands

The Importance of Effective Incident Response: the HBO Breach Expands

|

The attackers leaked more data, and demanded millions of dollars in bitcoin to prevent future leaks.

READ MORE
AlienVault Scours the Dark Web for Compromised Credentials

AlienVault Scours the Dark Web for Compromised Credentials

|

The company's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.

READ MORE