NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

NeuVector Releases CIS Compliance Tools for Kubernetes 1.6

|

The company releases new tools to help organizations ensure that their Kubernetes 1.6 container orchestration deployments meet the Center for Internet Security's benchmarks.

READ MORE

Over a Quarter of Government Computers Run on Outdated Operating Systems

|

The same is true of 15 percent of computers in finance, healthcare and retail.

READ MORE

ZingBox Extends IoT Security Lifeline to Healthcare Organizations

|

The company offers healthcare organizations free access to its IoT Guardian security solution in the wake of WannaCry.

READ MORE

Configuration Error Exposes Almost All American Voters' Personal Data

|

1.1 terabytes of data was left publicly accessible in an unprotected database.

READ MORE

Risk Management Pros Say an IoT Security Incident Could Be Catastrophic

|

Still, just 44 percent say they're able to protect their systems from risky IoT devices.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Whodunit: The Mystery of the APT

Cybercriminals can be certain about a few things. Most companies store their important data on their networks. Patents, innovative designs, customer information, and confidential data — it's all there. Intellectual property is highly valuable, making it the number one thing …

Hybrid WAN Services Emerging as a Viable Network Option

Business customers have relied on MPLS–based VPN service as their primary connectivity for their private networking needs for many years now. Ovum now sees an emerging trend of alternatives that can complement or replace MPLS–based VPN services. The growing use of Ethernet, …
 
SEE ALL WHITEPAPERS
 
SiteLock's SMART/DB Protects SMB WordPress Websites

SiteLock's SMART/DB Protects SMB WordPress Websites

|

The company launches a private beta of its security solution for WordPress databases.

READ MORE
11 Top Security Technologies for 2017

11 Top Security Technologies for 2017

|

Key technologies, according to Gartner, will range from cloud workload protection platforms to managed detection and response solutions.

READ MORE
Almost Half of All Third-Party Software Components Are Outdated, Insecure

Almost Half of All Third-Party Software Components Are Outdated, Insecure

|

In almost every case, a more secure version of the software component is available, a recent study found.

READ MORE
Top IT Security Certifications

Top IT Security Certifications

|

Here are 9 security certifications that can move your cybersecurity career ahead.

READ MORE