Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • How to Achieve an Optimal Security Posture

      The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service to legitimate users, or otherwise carry out any malicious or unwanted activities. Anyone who reads the security news these days knows that perfect security is…


  • The Software Supply Chain: Where Security Starts

    Concern about software supply chain security and the potential insertion of malware backdoors is at the forefront of cyber security challenges, but the problem has been around for decades and governments and industry are just getting around to addressing it now. You might question my assertion that this has been a concern for decades, so…


  • Deloitte Suffers Major Data Breach Without Multi-Factor Authentication

    The Guardian recently broke the news that the accounting firm Deloitte was hit last year by a cyber attack that exposed the confidential emails and plans of at least six of its clients. The attackers gained access to Deloitte’s systems in October or November of 2016, the report states, but the company didn’t discover the…


  • EiQ Networks, Now Called Cygilant, Nabs $7 Million in Funding

    EiQ Networks now has millions of dollars in fresh capital and a new name, Cygilant. The firm announced on Sept. 19 that it had raised $7 million in an investment round headed by Arrowroot Capital. To date, the company has raised $38 million. Cygilant plans to use the funds to hire more security engineers to…


  • Unpatched Open Source Software Flaw Blamed for Massive Equifax Breach

    A Baird Equity Research report [PDF] blamed the recent Equifax breach that exposed 143 million consumers’ personal information on a security flaw in the open source Apache Struts framework, which is used to build Java Web applications. Contrast Security co-founder and CTO Jeff Williams noted in a blog post that the Struts vulnerability in question…


  • SANS Updates Phishing Awareness Training Offering

    The SANS Institute has updated its Phishing Training solution, offering organizations new tools that help them determine how susceptible their workforces are to phishing attacks. SANS Phishing Training now features email templates that are updated on a regular basis, ensuring that security awareness professionals can keep up with the latest tactics used by scammers. It…


  • Most Small to Mid-Sized Organizations Don’t Use Multi-Factor Authentication

    While only 38 percent of large organizations don’t use multi-factor authentication to protect user accounts, 62 percent of small to mid-sized organizations do not use MFA, a recent KnowBe4 survey of 2,600 IT professionals found. Similarly, almost 97 percent of large organizations have an enforced password policy, compared to just under 88 percent of small…


  • AlienVault Scours the Dark Web for Compromised Credentials

    Cybersecurity firm AlienVault today took the wraps off a new AlienApp for its USM (Unified Security Management) Anywhere platform that alerts organizations to the presence of stolen credentials on the dark web. The company’s appropriately-named AlienApp for Dark Web Monitoring solution seeks out all the email addresses associated to a given domain. Additionally, users can…


  • Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

    LAS VEGAS — The concept of Red and Blue security team testing is one that is well understood among many security professionals. The Red Team takes an offensive penetration testing approach to security aiming to expose risks, while the Blue Team is tasked with defending against attackers. Justin Harvey, global lead for the Accenture Security’s…


  • Managing Insider Threats: Bupa Insurance Breach Affects 547,000 Customers

    International health insurance provider Bupa Global recently acknowledged that an employee had inappropriately accessed and removed information on 108,000 health insurance policies covering a total of 547,000 current and former customers. The exposed data includes names, birthdates, nationalities, contact details, and administrative information including Bupa membership numbers. “This was not a cyber attack or external…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies