NETWORK SECURITY

The network ties modern enterprises together and makes far-flung collaboration possible – which is why it's also an organization's biggest security nightmare. Our network security coverage keeps you up to date on the latest methods and technologies for keeping your network safe from hackers and other attacks.

LATEST NETWORK SECURITY ARTICLES

Financial Insecurity: 42 Percent of U.S. Financial Services Orgs Have Been Breached

|

Twenty-four percent were breached in the past year alone.

READ MORE

How to Prevent DNS Attacks

|

Hackers are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.

READ MORE

Duo Security Raises $70M, Expands 2FA Capabilities

|

Security vendor raises new funds as it continues to build out its 2FA and BeyondCorp framework capabilities.

READ MORE

Barracuda Debuts Active DDoS Prevention Service

|

The new cloud-based service provides businesses with both application security and protection from debilitating DDoS attacks.

READ MORE

The Best Security for Wireless Networks

|

WPA2-AES is the best option for wireless network security. We look at wireless router security, password strength, guest and public wi-fi security, and closing router backdoors.

READ MORE

TOP NETWORK SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

RISK MANAGEMENT

Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.

READ MORE

INCIDENT RESPONSE

Prepare for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Network Security Trends: Understanding the State of Network Security Today

Register for the Enterprise Strategy Group's Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network …

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …
 
SEE ALL WHITEPAPERS
 
Secure AWS Now: PHM Medical Records, Accenture Data Exposed Online

Secure AWS Now: PHM Medical Records, Accenture Data Exposed Online

|

Publicly accessible Amazon S3 buckets continue to expose a disturbing amount of sensitive data.

READ MORE
Akamai Reports Fast Flux Botnets Remain a Security Risk

Akamai Reports Fast Flux Botnets Remain a Security Risk

|

Botnets continue to benefit from technique that makes use of rapidly updated DNS entries to evade detection.

READ MORE
41 Percent of Consumers Won't Do Business with a Breached Company

41 Percent of Consumers Won't Do Business with a Breached Company

|

77 percent said they felt frustrated, angry and anxious after receiving a data breach notification, a recent survey found.

READ MORE
The Secure Supply Chain: Where Security Starts

The Secure Supply Chain: Where Security Starts

|

The next big front in the cyber security war could be the supply chain - and regulators are already looking at it.

READ MORE