Network Security

Network Security news, information, and how-to advice

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]
security code big data cyberespionage DDoS

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

A mug with the words GitHub Social Coding

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter

spying eye

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

fave raves primary

5 must-have network tools

IT pros are bullish on these five products

20160225 stock mwc ericsson booth security locks

This startup uses math to show whether your network is safe

Veriflow uses a verification system from the space program to study all possible data paths

mit wireless localizer

New wireless tech from MIT promises password-free Wi-Fi

Chronos system developed by researchers at MIT’s Computer Science and Artificial Intelligence Lab could also help make smart homes smarter

honey pot

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

submarine periscope 101722825

Google Submariner surfaces untrusted certificate authorities

Google calls out certificate authorities that can no longer be trusted and helps you steer clear of potentially fraudulent credentials

clicks pageviews traffic denial of service ddos attack

Rise in malicious domains portends rise in attacks

The Infoblox DNS Threat Index surged in the fourth quarter of 2015, showing that attackers are stepping up DNS-based activities

tor

Tor Project says it can quickly catch spying code

The organization has worked for three years to improve its ability to catch fraudulent software

generic image of a wi-fi router

New firmware analysis framework finds serious flaws in Netgear and D-Link devices

The framework's creators used it to find vulnerabilities in 887 firmware images

train wreck at montparnasse

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease admin tasks, it can also create new vulnerabilities

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Firewalls running Cisco Adaptive Security Appliance (ASA) software can be compromised remotely with malformed UDP packets

Rajeev Suri

Nokia's IoT security tool takes in the whole network

The NetGuard platform is designed to work with any vendor's network equipment

Protect yourself against DNS tunneling

A ubiquitous and often unprotected networking protocol, DNS makes a tempting target for hackers

What every CISO should know about machine learning

Machine learning allows security to adapt to the network being monitored, thereby improving threat detection and reducing false positives

insider threats

11 tips for spotting insider threats

Security experts offer advice aimed at helping companies find an insider attack sooner rather than later

Load More