Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

    The concept of cyber threat intelligence is really not much different from other areas of the intelligence field. In national security, intelligence gathering techniques seek to detect potential situations and draw conclusions that enable people to take action before anything serious occurs. Similarly, cyber threat intelligence is only one tool in a complete security arsenal.…


  • IaaS Security: Threats and Protection Methodologies

      By Maxim Sovetkin, Itransition Cloud services are becoming the main part of the infrastructure for many companies. Enterprises should pay maximum attention to security issues, moving away from typical approaches used in physical infrastructures, which are often insufficient in an atmosphere of constantly changing business requirements. Although cloud providers do all they can to…


  • 74 Percent of Companies that Suffer a Data Breach Don’t Know How It Happened

    According to the results of a recent survey [PDF] of 250 IT professionals, 34 percent of companies in the U.S. were breached in the past year, and 74 percent of the victims don’t know how it happened. The survey, conducted by iSense Solutions for Bitdefender, also found that two thirds of companies would pay an…


  • 74 Percent of Organizations Using Two-Factor Authentication Face User Complaints

    A recent?SecureAuth?survey of 300 cyber security professionals or IT decision makers found that 74 percent of respondents who use two-factor authentication (2FA) said they receive complaints about 2FA from their users — and 9 percent say they simply “hate it.” “It’s not surprising that organizations are receiving an increasing amount of complaints about 2FA,” SecureAuth…


  • 69 Percent of Companies Have Suffered Data Loss Due to Employee Turnover

    According to the results of a recent Osterman Research survey of 187 IT and/or HR decision makers, fully 69 percent of respondents have suffered significant data loss resulting from employees who left. While 96 percent of respondents disable access to employees’ mailboxes when they depart, 49 percent don’t monitor access to every application and source…


  • 5 Essential IoT Security Best Practices

    Securing the Internet of Things is an especially hot topic right now thanks to some bad botnets — and, of course, some major IoT vulnerabilities. This month the Mirai botnet waged the world’s largest DDoS attack in history against Dyn, a major domain-name server. The attack wreaked havoc across the entire internet, taking down major…


  • Two-Thirds of Americans Think They’re Tech Savvy… But They’re Not

    A recent survey of 2,056 U.S. consumers found that two-thirds of them see themselves as tech savvy, and 75 percent are concerned about their security and privacy online. Still, the survey, commissioned by Arbor Networks and conducted by Regina Corso Consulting, also found that 64 percent of respondents (and 71 percent of millennials) said they…


  • 2 Do’s and 2 Don’ts of Incident Response and Anomaly Detection

    By Alan Hall, Blue Coat (now part of Symantec) With the cost of a breach up 29 percent from 2013 — and continuing to rise — according to a recent Ponemon report, enterprise leaders are under mounting pressure to implement security solutions that are effective in detecting threats in this evolving cybersecurity landscape. While organizations…


  • 48 Percent of Companies Don’t Inspect the Cloud for Malware

    A recent survey of 643 IT and IT security practitioners in the U.S. and Canada found that fully 48 percent of respondents don’t inspect the cloud for malware, and another 12 percent are unsure whether they do or not. Notably, among those that do inspect, 57 percent say they have found malware. The survey, sponsored…


  • Selecting a Threat Risk Model for Your Organization, Part Two

    No threat risk model (an assessment of software, network or other risks and threats) is complete without a methodology for rating threats. In an earlier article we addressed two common and simple threat risk models, both developed by Microsoft — STRIDE and DREAD — along with the more complex CVSS (Common Vulnerability Scoring System). Here…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies