feature7 network security startups to watchNeed to secure non-human entities, leaky clouds, and complex environments? These 7 network security startups have bold ideas. By Jeff VanceAug 02, 20241 minStartupsNetwork Security feature 2024 Olympics put cybersecurity teams on high alertBy Christine WongJul 29, 20249 minsCyberattacksIncident ResponseData and Information Securitynews Port shadow: Yet another VPN weakness ripe for exploitBy David StromJul 24, 20245 minsInternet SecurityNetwork Security news analysisICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwideBy Lucian Constantin Jul 23, 20245 minsMalwareCritical InfrastructureNetwork Security featureNHIs may be your biggest — and most neglected — security holeBy Evan Schuman Jul 23, 20249 minsApplication SecurityIdentity and Access ManagementNetwork Security featureHashcat explained: How this password cracker worksBy J.M. Porup Jul 19, 20247 minsPasswordsNetwork SecuritySecurity opinionBeware the tools that can bring risk to a Windows networkBy Susan Bradley Jul 18, 20248 minsNetwork AdministratorWindows SecurityCloud Security brandpostSponsored by Trinity CyberIntroducing Full Content Inspection: The New Standard in Network Security, and Why it’s NecessaryBy Trinity Cyber Jul 17, 20244 minsNetwork Security newsCisco Talos analyzes attack chains, network ransomware tacticsBy Michael Cooney Jul 11, 20241 minRansomwareNetwork Security Articlesnews analysisMD5 attack puts RADIUS networks everywhere at riskA design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions.By Lucian Constantin Jul 09, 2024 7 minsCyberattacksNetwork SecurityfeatureCisco adds heft to cybersecurity push with acquisitions, new talentCisco aims to relieve beleaguered network and security teams with its AI-driven, platform-based approach to enterprise security.By Bob Violino Jul 09, 2024 1 minNetwork SecurityfeatureFake network traffic is on the rise — here's how to counter itThe increasing volume and sophistication of fake network traffic has raised the cybersecurity stakes, jeopardizing sales and marketing efforts and complicating defense and protection.By Mary K. Pratt Jul 09, 2024 12 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsCisco patches actively exploited zero-day flaw in Nexus switchesThe moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant. By Lucian Constantin Jul 02, 2024 4 minsThreat and Vulnerability ManagementZero-day vulnerabilityNetwork Securityfeature10 most powerful cybersecurity companies todayWith AI and generative AI capabilities on the rise, a shift toward consolidation and platforms over point solutions is redefining the IT security market — as well as its leading vendors.By Neal Weinberg Jul 02, 2024 14 minsAccess ControlIdentity Management SolutionsMcAfeenewsTata Communications partners with Versa Networks on hosted SASEHybrid work, SD-WAN, and digital-first adoption make enterprises more vulnerable to attack, increasing the need for SSE solutions, the company says.By Lynn Greiner Jun 21, 2024 3 minsCloud SecurityNetwork SecuritynewsHow AWS secures its infrastructure with SonarisWith Sonaris, an internally developed tool, AWS continuously monitors its systems to pre-empt attacks on customer data.By Shweta Sharma Jun 20, 2024 1 minCloud SecurityNetwork SecuritynewsNetskope secures SaaS apps with genAIEnhancements to Netskope’s cloud access security broker (CASB) module aim to secure the use of genAI and SaaS applications.By Denise Dubie Jun 11, 2024 1 minNetwork SecurityfeatureWhitelisting explained: How it works and where it fits in a security programWhitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle?By Josh Fruhlinger and CSO Staff Jun 07, 2024 10 minsEmail SecurityApplication SecurityData and Information SecurityfeatureWhat are non-human identities and why do they matter?When digital systems need access and permissions they require credentials just like human beings. These non-human identities allow many components of complex systems to work together but present significant security issues.By Chris Hughes Jun 03, 2024 8 minsAccess ControlIdentity and Access ManagementNetwork SecurityfeatureHow to choose the right network security monitoring productNetwork security monitoring software is essential because it enhances security by detecting threats in real time and ensures operational efficiency by minimizing downtime and optimizing performance. Here’s what to look for.By Linda Rosencrance May 27, 2024 8 minsSecurity Monitoring SoftwareData and Information SecurityNetwork SecuritynewsFCC proposes BGP security measuresProtecting the Border Gateway Protocol is as important as protecting the border.By Gyana Swain May 17, 2024 1 minRegulationNetwork Security Show more Show less View all Resources whitepaper Full Content Inspection: The New Standard in Network Security Trinity Cyber disrupts the hackers and adversaries and the unique tools and methods they employ – a much smaller data set with a much bigger payoff. The post Full Content Inspection: The New Standard in Network Security appeared first on Whitepaper Repository –. By Trinity Cyber 11 Jul 2024Business OperationsNetwork SecuritySecurity whitepaper Dynamic Network Segmentation A Must-Have for Digital Businesses in the Age of Zero Trust By ForeScout Technologies 08 Jul 2024Business OperationsNetwork SecuritySecurity whitepaper Network and Connectivity Trends for 2024 and Beyond By Comcast Business 08 Jul 2024Business OperationsData and Information SecurityNetwork Security View all Podcasts podcastsSponsored by CiscoSecure Remote Working: what we’ve learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.3 episodesRemote Access Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Aug 10, 202032 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Aug 10, 202026 mins Security Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What’s driving demand and how providers’ capabilities differ Oct 15, 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Attackers leverage Cloudflare tunnels to obscure malware distribution By Lucian Constantin Aug 02, 20245 mins PhishingCyberattacks news Who are the two Russian convicts released in the US-Russia prisoner swap? By Shweta Sharma Aug 02, 20243 mins Cybercrime feature 12 wide-impact firmware vulnerabilities and threats By Lucian Constantin Aug 02, 202412 mins Vulnerabilities podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO