Networks

Palo Alto Enters Small Business, Remote and Home Markets with Okyo

Palo Alto Networks (PANW) is bringing its enterprise-class security to small business and home markets with Okyo, a Wi-Fi 6 hardware device announced today. At $349 a year, the security and router ...

3 Tests to Ensure Zero Trust Network Security

The COVID pandemic has highlighted the challenges of ensuring security across an expanding enterprise network forced to support more and more remote workers, an ever-increasing diversity of devices, a...

T-Mobile Confirms Data Breach, 47.8 Million Records Exposed

Update: T-Mobile USA officials have confirmed that the records of 47.8 million current, former and prospective customers were stolen in a "highly sophisticated cyberattack" late last week. That num...

Phishing Campaign Used Morse Code to Evade Detection: Microsoft

A phishing campaign that Microsoft security researchers have been tracking for about a year highlights not only the ongoing success of social engineering efforts by hackers to compromise systems, but ...

NordVPN vs ExpressVPN: Which VPN Should You Choose?

If you're shopping for an enterprise VPN, there's a good chance NordVPN and ExpressVPN are on your list. Both vendors offer competitive VPN solutions that enable you and your employees to use the int...

Accenture Attack Highlights Evolving Ransomware Threats

Accenture officials are saying they staved off a ransomware attack this week by a cybercriminal ring using the LockBit malware even as the hacker group claimed to have captured data from the massive g...

Top Microsegmentation Software for 2021

It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry. Enter microsegmentation as a...

Top XDR Security Solutions for 2022

Extended detection and response (XDR) has emerged in the last few years as a new approach by cybersecurity vendors to unify their products into a comprehensive security offering. That all-in-...

Best Incident Response Tools and Software for 2022

With major cybersecurity incidents an almost daily occurrence, organizations need an incident response plan for the likelihood that they will someday be breached. And more than ever, they also need an...

Startup Sees File System as Key to Security

While many cybersecurity vendors approach zero trust from the perspective of microsegmentation, shrinking the network as much as possible, one startup thinks security needs to be as close to the data ...

Latest articles