Networks

Microsegmentation Is Catching On as Key to Zero Trust

For a security technology that's only a few years old, microsegmentation is catching on quickly. According to a new report from edge security vendor Byos, 88 percent of cybersecurity leaders believ...

Types of Firewalls Explained

This post has been updated for 2021. Firewalls are as central to IT security as antivirus programs are to PCs, and the multi-billion-dollar market remains large and growing. In the broadest ter...

Choosing a Managed Security Service: MDR, Firewalls & SIEM

Many large enterprises struggle to stay on top of serious cyber threats like ransomware. For a small business, the challenge can seem overwhelming. Between the growing threats and a shortage of cyb...

Top Open Source Security Tools

Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. T...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in ...

What are Network Firewalls?

The network firewall is the first line of defense for traffic that passes in and out of a network. The firewall examines traffic to ensure it meets the security requirements set by the organization, a...

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent o...

NSA, CISA Release Guidance for Choosing and Hardening VPNs

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance and best practices for securing virtual private network (VPN) solutions. VP...

The Case for Decryption in Cybersecurity

Effective encryption has long been critical for protecting sensitive enterprise data, but as hackers increasingly leverage encrypted channels to access and traverse enterprise networks, secure traffic...

Latest articles