Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Apple White Hat Hack Shows Value of Pen Testers

        The best Cybersecurity Awareness Month lesson may have come from Apple, which could ultimately pay bug bounties of around $500,000 to a group of white hat hackers who found 55 vulnerabilities on Apple’s own networks, including 11 critical vulnerabilities. The main lesson is pretty simple: No one is safe, and the need for…


  • Cybersecurity Jobs & Salaries: Outlook 2020

    There has never been a better time to have a career in IT security. That’s because the demand for IT security people of all skill levels continues to skyrocket and, what’s more, it shows no sign of coming back down to more moderate levels. With IT security threats showing no sign of abating and data…


  • Gartner’s Top IT Security Projects for 2019

      At this week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Brian Reed outlined 10 cybersecurity projects that could help enterprises reduce security risk. Reed also noted enterprise spending priorities. CASB tops the list by a wide margin, with 46% compound annual growth (CAGR) expected through 2022, followed by encryption at 23.7% annual growth, threat…


  • Security Operations Center (SOC) Best Practices

    Enterprises face an onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and suspicious behavior. Endpoint security, intrusion detection and prevention, security information and event management (SIEM), threat intelligence, and other security systems flood security teams with alerts and log entries. With the number and sophistication…


  • RSA Conference 2021: Speakers, Vendors & Sessions

    The RSA Conference is one of the biggest events of the year in the InfoSec industry, drawing vendors, experts, security practitioners and the curious from near and far. The theme for the 2019 event is “Better,” with the idea being that organizations, vendors and the cybersecurity industry as a whole can continue to do better.…


  • Over Half of Companies Are Upping Spending on IT Security

    Driven by fear of data breaches and new privacy regulations, such as Europe’s General Data Protection Regulation (GDPR), large enterprises are spending aggressively on IT security measures, according to eSecurity Planet‘s newly released 2019 State of IT Security survey. The survey found that 54 percent of companies will increase their IT security spending this year,…


  • Cyber Security Jobs & Salary for 2021

    With a global cybersecurity staffing shortage of 3 million and growing, including a need for 500,000 IT security pros in North America alone, IT security jobs are going to be in plentiful supply again in 2019, and those with the right skills will be able to take their pick. The shortage of security talent isn’t…


  • UEBA: Protecting Your Network When Other Security Systems Fail

    User and entity behavior analytics (UEBA) is a valuable tool for detecting signs of malicious activity within your network. UEBA monitors the activities of users and entities (such as hardware devices and networks) and compares present activity to “normal” or “baseline” behavior. Using advanced statistical analysis and, in some cases, machine learning algorithms, the aim…


  • UTM Appliance Definition

      A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. See our picks for Top UTM vendors. UTM appliances provide an alternative approach to building a security solution from several different point products, often from different vendors. These point…


  • 10 Security Projects CISOs Should Consider: Gartner Analyst

      At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk. First, though, MacDonald listed 10 things enterprises should already be doing to “make sure you’ve got the basics right.” Those 10 basics are: Upgrade to…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies