Networks

Penetration Testing vs. Vulnerability Testing: An Important Difference

Many cybersecurity audits now ask whether penetration testing is conducted and how vulnerabilities are detected and tracked. These questions ask IT teams to consider how frequently security is tested ...

SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats

Critical infrastructure security has moved to the forefront of cybersecurity concerns amid the Russian invasion of Ukraine – and in at least one case has led to some pretty unique cybersecurity advice...

10 Top Open Source Penetration Testing Tools

Professional penetration testers, or pen testers, are akin to "white hat" or ethical hackers, adversaries with an explicit authorization to attack a network. During this simulation of real-world condi...

9 Best Penetration Testing Tools for 2022

A penetration test, or pen test, is the simulation of a cyber attack. The goal is to assess a network’s security to improve it and thus prevent exploits by real threat actors by fixing vulnerabilities...

Three Ways to Protect Unfixable Security Risks

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...

What is Cybersecurity Risk Management?

Risk management is a concept that has been around as long as companies have had assets to protect. The simplest example may be insurance. Life, health, auto, and other insurance are all designed to h...

SIEM vs. SOAR vs. XDR: What Are The Differences?

Endpoint security and firewalls are two foundational elements of enterprise security, but with remote work, IoT devices and other technologies expanding the boundaries of the network edge, centralized...

SIEM Explained: What is SIEM and How Does it Work?

Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger enterprise clients, but ...

Becoming an MSSP: Tools, Services & Tips for Managed Security Services

The next few years will see a surge in channel spending. According to Jay McBain, an analyst at Forrester Research, spending on IT and telecommunications will be worth about $7 trillion by 2030. The c...

Nmap Vulnerability Scanning Made Easy: Tutorial

The UK government recently started an open-source GitHub repository to help organizations scan networks for vulnerabilities. The idea behind the Scanning Made Easy project from the National Cyber S...

Latest articles