Networks

AT&T Looks to Shut Down Botnet that Attacked 5,700 Network Appliances

AT&T is working to stop a botnet that has infected at least 5,700 network edge servers inside its networks and appears designed to steal sensitive information and launch distributed denial-of-serv...

Fortinet vs Palo Alto Networks: Top NGFWs Compared

A next-generation firewall (NGFW) is an important component of network security and represents the third generation of firewall technology. NGFWs provide capabilities beyond that of a traditional, ...

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized i...

The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard....

DDoS Attacks Skyrocket, Kaspersky Researchers Say

Distributed denial of service (DDoS) attacks soared in the third quarter, giving organizations yet another cyber threat to worry about. Kaspersky researchers reported that total attacks were up by ...

Microsegmentation Is Catching On as Key to Zero Trust

For a security technology that's only a few years old, microsegmentation is catching on quickly. According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believ...

Types of Firewalls Explained

This post has been updated for 2021. Firewalls are as central to IT security as antivirus programs are to PCs, and the multi-billion-dollar market remains large and growing. In the broadest ter...

Choosing a Managed Security Service: MDR, Firewalls & SIEM

Many large enterprises struggle to stay on top of serious cyber threats like ransomware. For a small business, the challenge can seem overwhelming. Between the growing threats and a shortage of cyb...

Top Open Source Security Tools

Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. T...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Latest articles

Top Cybersecurity Account...

AT&T Looks to Shut D...

Nation-State Attackers Us...

Fortinet vs Palo Alto Net...