Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • University of Virginia Breached by Phishing Attack

    The University of Virginia (UVA) recently began notifying more than 1,400 of its Academic Division employees that their data was exposed as a result of a successful phishing attack. The FBI alerted the university to the breach, which happened between November 2014 and February 2015. “Suspects overseas involved in this incident are in custody,” UVA…


  • 10 Open Source Security Breach Prevention and Detection Tools

    While the breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, open source tools are also popular with security pros. Open source security breach prevention and detection tools can play a major role in keeping your organization safe in the battle against hackers, cybercriminals and foreign governments. Here are 10…


  • 5 Key New Features in Nmap Network Security Tool

      A new version of Nmap, a hugely important open source security tool used for network mapping and port scanning, exploded onto the scene last month, giving network security staff and others who use it an early Christmas present. No obscure open source network mapping tool, Nmap has been featured in more than a dozen…


  • 3 Facts about Sandbox-based Gateway Appliances

    By Sanjay Katkar, CTO, Quick Heal Technologies Sandbox-based gateway security appliances are widely used in enterprises both large and small, for plenty of good reasons. They are popular, effective, easy to implement and often inexpensive. These appliances employ a variety of tools to block new, unknown malware along with targeted attacks found in email attachments…


  • Breach at Securus Technologies Exposes 70 Million Prison Phone Calls

    Reporters at The Intercept recently received a 37 GB cache of records of more than 70 million phone calls apparently stolen from Securus Technologies, which provides phone services for approximately 2,200 U.S. prisons. The calls were placed between December 2011 and the spring of 2014 — the records include calls placed to almost 1.3 million…


  • 5 Tips to Protect Networks Against Shodan Searches

    A recent round of media buzz has swarmed around the search engine called Shodan. If you’ve seen any stories like this or this, you’ve read that Shodan may be “the scariest search engine on the Internet.” The penetration testing search engine, it is said, reveals critical infrastructure like network servers, routers and even printers, empowering…


  • How VMI Can Improve Cloud Security

    By Nazar Tymoshyk, SoftServe Following Einstein’s wisdom, let me explain why cloud security is important, in terms that make sense to a six-year-old. Imagine that you have antivirus software installed on your computer that tries to stop attacks directed against it. If that computer is connected to the cloud, it’s connected to other computers and…


  • Top 10 Encryption Tools You Should Know

    Encryption tools protect sensitive data from third parties. But encryption does not guarantee that files, removable media, email messages and network packets will not be hacked. Poorly written user authentication policies, configuration mistakes, social engineering and tool restrictions can all create problems. To catch these vulnerabilities, administrative policies on continuous testing and monitoring of encrypted…


  • How Does Security Impact Employee Productivity?

    Security is a requirement for modern organizations that must protect their technology assets and corporate data against attacks. But what impact does security have on users within organizations? That’s one of many questions Dell addresses in a new study. Dell sponsored the July survey of 460 IT professionals and 301 full-time business users. One top-line…


  • 5 Ways to Make Public Cloud More Secure

    By Chad Whalen, Fortinet More businesses than ever are moving their business operations – in part or in whole – to the cloud. An IDG Enterprise study found 69 percent of businesses have at least one application or a portion of their computing infrastructure in the cloud as of 2014 and another 18 percent are…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies