Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • How VMI Can Improve Cloud Security

    By Nazar Tymoshyk, SoftServe Following Einstein’s wisdom, let me explain why cloud security is important, in terms that make sense to a six-year-old. Imagine that you have antivirus software installed on your computer that tries to stop attacks directed against it. If that computer is connected to the cloud, it’s connected to other computers and… Read more


  • Top 10 Encryption Tools You Should Know

    Encryption tools protect sensitive data from third parties. But encryption does not guarantee that files, removable media, email messages and network packets will not be hacked. Poorly written user authentication policies, configuration mistakes, social engineering and tool restrictions can all create problems. To catch these vulnerabilities, administrative policies on continuous testing and monitoring of encrypted… Read more


  • How Does Security Impact Employee Productivity?

    Security is a requirement for modern organizations that must protect their technology assets and corporate data against attacks. But what impact does security have on users within organizations? That’s one of many questions Dell addresses in a new study. Dell sponsored the July survey of 460 IT professionals and 301 full-time business users. One top-line… Read more


  • 5 Ways to Make Public Cloud More Secure

    By Chad Whalen, Fortinet More businesses than ever are moving their business operations – in part or in whole – to the cloud. An IDG Enterprise study found 69 percent of businesses have at least one application or a portion of their computing infrastructure in the cloud as of 2014 and another 18 percent are… Read more


  • How to Choose the Right Security Testing Tool

    By Stanislav Breslavskyi and Nazar Tymoshyk, SoftServe Sooner or later, any expert involved in software or computer systems development and maintenance processes will face security questions. To find solutions, they’ll need security tools. Let’s define the types of security tools and their roles in different kind of projects and development stages. Picking the right tool… Read more


  • Why Is Fighting Cybercrime So Hard?

    A few hundred expert hackers offering “crime as a service” are behind a large percentage of all the cybercrime acts committed. That’s the conclusion of a group of international law enforcement experts from organizations including the FBI and the UK’s National Crime Agency. Talking at the recent InfoSec Europe security conference in London, FBI agent… Read more


  • 4 Lessons Learned from the POODLE Hack

    By Nazar Tymoshyk and Stanislav Breslavskyi The growing list of recent red-letter security vulnerabilities—Beast, Heartbleed, Shellshock—was recently extended with a new threat, POODLE. No matter how fluffy your associations with this word are, the term sends shivers down the spine of those who use SSLv3 protocol. POODLE stands for Padding Oracle on Downgraded Legacy Encryption,… Read more


  • 20 Top Security Influencers

    By Erin Lee and Jessica Vartabedian With so much going on in the enterprise security space, it can be hard to keep up with the flow of information and to know where to turn for actionable advice. This list of security experts, selected by eSecurityPlanet, is a good place to start. All are active bloggers… Read more


  • Stolen Computers Lead to New Heartland Payment Systems Breach

    Heartland Payment Systems recently began notifying approximately 2,200 people that their personal information may have been compromised when 11 password-protected computers were stolen from Heartland’s office in Santa Ana, California. Four of the 11 stolen computers held personally identifiable information (PII), including Social Security numbers and bank account information. The Santa Ana office, formerly Ovation… Read more


  • Making Credit Cards Unhackable

    Credit cards are not secure. That has been the case for a long time, and it remains the case today.  It is why point-of-sale malware has been so popular among hackers and their dark Web customers, and it is why major retailers like Target, Home Depot and Michael’s, and other businesses like Anthem and Adobe… Read more


Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis