Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Forgotten Passwords Cost Companies $200,000 a Year

    A recent survey of 2,000 people in the U.S. and the U.K. has found that companies lose over $420 in productivity per employee per year due to workers struggling with passwords — for a 500-person company, that’s a loss of more than $200,000 per year. The survey, conducted by Widmeyer and sponsored by Centrify, also…


  • Sysinternals and Microsoft Windows: An Overview

    If you’ve even a modicum of experience with more than a few versions of Microsoft Windows, you’ve probably heard of Sysinternals and know the name Mark Russinovich. Microsoft acquired Sysinternals in 2006, and today Mark Russinovich is a technical fellow in the Cloud and Enterprise division. While he spends most of his time focusing on…


  • How to Build Security into Your Software Development Lifecycle

    By Nazar Tymoshyk, SoftServe In today’s technology environment, the question is no longer if your business is vulnerable to cyber security threats or may be attacked someday. The question is when, and will you be prepared. Widespread use of cloud computing, software-as-a-service (SaaS) and smart devices leave businesses of all types and scales more vulnerable…


  • Sony Networks Taken Down by DDoS Attack

    Sony recently acknowledged that its PlayStation Network and Sony Entertainment Network had been taken offline due to a distributed denial of service (DDoS) attack, stating that the networks had been “impacted by an attempt to overwhelm our network with articifically high traffic.” “We are under attack by a large scale DDoS,” Sony Online Entertainment president…


  • SaaS Security Risks: It’s the Users, Stupid

    Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise’s data to attack. At the Black Hat USA conference in Las Vegas this week, security researchers from Adallom will present a workshop…


  • How to Reduce Use-After-Free Memory Risk

    Look at any recent security update from Microsoft, Google or Mozilla and you will find use-after-free memory errors. These vulnerabilities enable attackers to take advantage of allocated memory after it has already been used. Attackers can potentially leverage that memory space to execute arbitrary code. “We’re seeing more use-after-free memory attacks than we ever have…


  • Code Spaces Destroyed by Cyber Attack

    The code hosting service Code Spaces was recently forced to shut down permanently after suffering a multi-stage attack on its servers. On June 17, 2014, Code Spaces was hit by a DDoS attack — but as the company soon found, that was just the beginning. The unidentified attacker had also gained access to Code Spaces’…


  • Lowe’s Acknowledges Third Party Data Breach

    Lowe’s recently began notifying an undisclosed number of current and former employees that their personal information may have been disclosed when a third-party vendor mistakenly backed up Lowe’s employee data to an unsecured server. The vendor, SafetyFirst, manages an online database called E-DriverFile, which stores compliance information related to current and former drivers of Lowe’s…


  • 79 Percent of IT Administrators Want to Quit Due to Stress

    According to the results of GFI Software‘s third annual IT Admin Stress Survey, conducted by Opinion Matters, fully 79 percent of IT staff are actively considering leaving their jobs due to job-related stress. That’s a significant increase from 2013, when just 57 percent of respondents said they were actively considering leaving. The survey of 200…


  • Florida Man Gets Five Years in Prison for Identity Theft

    Andrew Ware, 27, of Lauderhill, Fla., was recently sentenced to 70 months in prison, to be followed by three years of supervised release, for his involvement in a stolen identity refund fraud (SIRF) and access device fraud scheme. Ware previously pled guilty to one count each of conspiracy to commit wire fraud, wire fraud, conspiracy…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies