Networks

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized i...

The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard....

DDoS Attacks Skyrocket, Kaspersky Researchers Say

Distributed denial of service (DDoS) attacks soared in the third quarter, giving organizations yet another cyber threat to worry about. Kaspersky researchers reported that total attacks were up by ...

Microsegmentation Is Catching On as Key to Zero Trust

For a security technology that's only a few years old, microsegmentation is catching on quickly. According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believ...

Types of Firewalls Explained

This post has been updated for 2021. Firewalls are as central to IT security as antivirus programs are to PCs, and the multi-billion-dollar market remains large and growing. In the broadest ter...

Choosing a Managed Security Service: MDR, Firewalls & SIEM

Many large enterprises struggle to stay on top of serious cyber threats like ransomware. For a small business, the challenge can seem overwhelming. Between the growing threats and a shortage of cyb...

Top Open Source Security Tools

Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. T...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in ...

What are Network Firewalls?

The network firewall is the first line of defense for traffic that passes in and out of a network. The firewall examines traffic to ensure it meets the security requirements set by the organization, a...

Latest articles

MITRE Expands Security Te...

Top IoT Security Solution...

Companies Get Better at F...

How Hackers Use Payloads ...