Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Startup Sees File System as Key to Security

    While many cybersecurity vendors approach zero trust from the perspective of microsegmentation, shrinking the network as much as possible, one startup thinks security needs to be as close to the data as possible and is thus focused on data storage. Maryland-based RackTop Systems boasts a Department of Defense (DoD) pedigree, giving its founders a vantage…


  • How Zero Trust Security Can Protect Against Ransomware

    The Colonial Pipeline ransomware attack has been by many measures the worst to date in the history of cybersecurity, nearly crippling the Southeastern U.S. and causing the pipeline company untold millions in damages. Despite reportedly paying nearly $5 million in ransom to the DarkSide ransomware as a service group, the decryption tool provided by the…


  • Critical Infrastructure Protection: Physical and Cyber Security Both Matter

    Oil and gas companies have two key areas of concern when addressing cybersecurity, especially in their unmanned remote facilities. They have to supply physical security that denies access to the cyber-physical assets, and they sometimes must employ several cyber defenses depending on the device or system in question. So when you are looking at doing…


  • U.S. Issues Ransomware Guidance, Cybersecurity Executive Order

    The U.S. Cybersecurity and Infrastructure Agency (CISA) and the FBI have issued guidance for protecting critical infrastructure from ransomware, shedding some light on the DarkSide attack that crippled the Colonial Pipeline and left much of the East Coast facing an energy shortage. The agencies didn’t name Colonial in the alert, referring only to a “pipeline…


  • OAuth: Your Guide to Industry Authorization

    Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorization purposes. Enter authorization-focused OAuth 2.0 and authentication-focused OpenID Connect (OIDC). In the last decade, organizations adopted OAuth and its companion OIDC to enable customers…


  • How to Implement Zero Trust

    Zero trust has gone from new idea to buzzword and industry paradigm in a decade. Much more than a one size fits all product or service, zero trust requires an organization to identify its most sensitive assets, monitor traffic flows, and enforce granular, application-level access policies–all of which are entirely dependent on your organization. As…


  • How to Implement Microsegmentation

    In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Microsegmentation is about identifying your organization’s most valuable network segments, establishing strict communication policies, and becoming the master of your network flows. Unlike traditional network segmentation,…


  • Managed SIEM: A Faster Way to Great Security

    Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security services provider (MSSP) is an attractive solution. Managed Security Information and Event Management (SIEM) systems are a good way to accomplish that.…


  • The IoT Cybersecurity Act of 2020: Implications for Devices

    A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an estimated 9.9 billion Internet of Things (IoT) devices. By 2025, we expect 21.5 billion. As more information about IoT device…


  • Apple White Hat Hack Shows Value of Pen Testers

        The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies