Networks

Top SD-WAN Solutions for Enterprise Security

The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide...

Getting Started with the Burp Suite: A Pentesting Tutorial

Burp is one of the top-rated security suites for pentesting and ethical hacking. While there are paid professional and enterprise editions, you can install the community edition for free and even use...

8 Top Unified Threat Management (UTM) Software & Hardware Vendors

Unified threat management (UTM) offers something approaching total security in a box for small and midsize enterprises (SMEs), combining multiple network security functions in a single appliance. I...

WatchGuard, Windows Vulnerabilities Require Urgent Fixes

Vulnerabilities in WatchGuard firewalls and Microsoft Windows and Windows Server need to be patched and fixed immediately, security organizations said in alerts this week. The U.S. Cybersecurity an...

Top 10 Open Source Vulnerability Assessment Tools

Unlike penetration tests, vulnerability tests do not consist of performing real attacks. However, they’re no less valuable, as they can spot vulnerabilities missed by a penetration test and provide a ...

Critical Infrastructure, ICS/SCADA Systems Under Attack by Advanced Threat Groups

Critical infrastructure, industrial control (ICS) and supervisory control and data acquisition (SCADA) systems are under increasing threat of cyber attacks, according to a number of recent warnings fr...

Top Deception Tools for 2022

As technologies advance, and cyber threats with them, deception has become a big part of the 21st century cybersecurity battle. From bank transfer cons to CEO fraud to elaborate phishing and spear phi...

SAML: Still Going Strong After Two Decades

SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere. In 2005, the open standard consortium...

Addressing Remote Desktop Attacks and Security

The Remote Desktop Protocol (RDP) has long been essential for IT service management and remote access. Still, in the wrong hands, RDP attacks and vulnerabilities related to remote desktop software ar...

Top Security Orchestration, Automation and Response (SOAR) Solutions for 2022

Organizations are under pressure on both the cybersecurity and staffing fronts. They often struggle to fill vital security roles such as security analysts, leaving their data and infrastructure vulner...

Latest articles