Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • M&A Due Diligence, Cyber Security, and the Massive Yahoo Data Breach

    Yahoo! Inc. recently announced that at least 500 million users’ names, email addresses, phone numbers, birthdates, hashed passwords, and in some cases encrypted or unencrypted security questions and answers were stolen from the company’s network in late 2014 in what it believes was a state-sponsored attack. The breach, which was uncovered only recently, comes just…


  • Which Threat Risk Model Is Right for Your Organization?

    Threat risk modeling, which involves identifying, quantifying and addressing security risks associated with IT systems, is a big part of the job for security professionals. Fortunately, numerous threat risk models have been developed. Some are geared toward specific purposes (such as web application development), but can be adapted in other ways and for other uses.…


  • Must You Use Microsoft’s In-Box DNS?

    By Jeremy Moskowitz, PolicyPak Software In the case of your typical Windows domain network, it is “traditional wisdom” that only Microsoft DNS must be used with Active Directory for internal DNS resolution. Many times this is because: It’s convenient to use the in-box solution The myth that Active Directory requires Microsoft DNS to function properly…


  • How to Mitigate Fourth-Party Security Risks

    While security threats resulting from exposure to third-party partners are serious, security pros face an even tougher challenge from fourth-party security risks. What do we mean by fourth-party risks? Think of fourth parties as the “vendors of your vendors.” Everyone from Amazonian giants to small businesses uses subcontractors. According to a recent BitSight report of…


  • 62 Percent of Employees Have Access to Data They Shouldn’t Be Able to See

    According to the results of a recent survey of 3,027 employees in the U.S., U.K., France and Germany (1,371 end users and 1,656 IT professionals), fully 62 percent of end users acknowledged that they have access to company data they probably shouldn’t be able to see. The study, conducted by the Ponemon Institute and sponsored…


  • Best Next-Gen Endpoint Security Solutions

      Endpoint security is still dominated by traditional anti-virus solutions, with Gartner ranking Symantec, Sophos, Trend Micro and Kaspersky as leaders in the field. But new next-generation endpoint security solutions are generating buzz as either replacements or supplements to existing security investments. These new solutions promise to stop zero-day attacks and ransomware, two big security…


  • 5 Ways to Defuse the Data Threat from Departing Employees

    When employees leave a company and take sensitive data with them, intentionally or not, the repercussions can be massive. In February of this year, an employee leaving the FDIC exposed 44,000 FDIC customers’ personal information when she downloaded the data to her personal storage device. Later the same month, a former employee of UK regulator…


  • Where Should Security Keys be Kept in the Cloud?

    The use of cryptographic keys is a linchpin of modern security. When it comes to the cloud, there is some debate as to where those keys should exist and how their placement impacts cloud security. Andy Ellis, chief security officer at Akamai, has his fair share of experience building and deploying key management infrastructure and…


  • 52 Percent of Consumers Would Pay More for Products or Services with Better Data Security

    According to the results of a recent survey of 2,000 U.S. consumers, 52 percent of respondents would consider paying more for the same products or services from a provider with better data security, and the same percentage said security is an important or main consideration when making purchases. The survey, conducted in April 2016 by…


  • Ransomware and the Internet of Things: A Growing Threat

    Sekhar Sarukkai, Skyhigh Networks “If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies