newsCisco Talos analyzes attack chains, network ransomware tacticsRansomware actors often prioritize gaining initial access to targeted networks, says Cisco’s Talos security intelligence group.By Michael CooneyJul 11, 20241 minRansomwareNetwork Security news analysis MD5 attack puts RADIUS networks everywhere at riskBy Lucian ConstantinJul 09, 20247 minsCyberattacksNetwork Securityfeature Cisco adds heft to cybersecurity push with acquisitions, new talentBy Bob ViolinoJul 09, 20241 minNetwork Security featureFake network traffic is on the rise — here's how to counter itBy Mary K. Pratt Jul 09, 202412 minsThreat and Vulnerability ManagementData and Information SecurityNetwork Security newsCisco patches actively exploited zero-day flaw in Nexus switchesBy Lucian Constantin Jul 02, 20244 minsThreat and Vulnerability ManagementZero-day vulnerabilityNetwork Security feature10 most powerful cybersecurity companies todayBy Neal Weinberg Jul 02, 202414 minsAccess ControlIdentity Management SolutionsMcAfee newsTata Communications partners with Versa Networks on hosted SASEBy Lynn Greiner Jun 21, 20243 minsCloud SecurityNetwork Security newsHow AWS secures its infrastructure with SonarisBy Shweta Sharma Jun 20, 20241 minCloud SecurityNetwork Security newsNetskope secures SaaS apps with genAIBy Denise Dubie Jun 11, 20241 minNetwork Security ArticlesfeatureWhitelisting explained: How it works and where it fits in a security programWhitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle?By Josh Fruhlinger and CSO Staff Jun 07, 2024 10 minsEmail SecurityApplication SecurityData and Information SecurityfeatureWhat are non-human identities and why do they matter?When digital systems need access and permissions they require credentials just like human beings. These non-human identities allow many components of complex systems to work together but present significant security issues.By Chris Hughes Jun 03, 2024 8 minsAccess ControlIdentity and Access ManagementNetwork SecurityfeatureHow to choose the right network security monitoring productNetwork security monitoring software is essential because it enhances security by detecting threats in real time and ensures operational efficiency by minimizing downtime and optimizing performance. Here’s what to look for.By Linda Rosencrance May 27, 2024 8 minsSecurity Monitoring SoftwareData and Information SecurityNetwork SecuritynewsFCC proposes BGP security measuresProtecting the Border Gateway Protocol is as important as protecting the border.By Gyana Swain May 17, 2024 1 minRegulationNetwork Securityhow-toDownload the SASE and SSE enterprise buyer’s guideFrom the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what SASE (Secure Access Service Edge) and SSE (Secure Service Edge) can do for their organizations and how to choose the right solution.By Neal Weinberg May 13, 2024 1 minRemote Access SecurityNetwork SecurityEnterprise Buyer’s GuidesfeatureRidding your network of NTLMThe path to eradicating this ancient protocol and security sinkhole won’t be easy, but the time has come for its complete eradication.By David Strom May 13, 2024 8 minsAuthenticationWindows SecurityNetwork Securitynews analysisMassive security hole in VPNs shows their shortcomings as a defensive measureResearchers found a deep, unpatchable flaw in virtual private networks dubbed Tunnelvision can allow attackers to siphon off data without any indication that they are there.By Evan Schuman May 08, 2024 8 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecurityfeatureHow to future-proof Windows networks: Take action now on planned phaseouts and changesMicrosoft has telegraphed its desire to start shuttering some legacy Windows systems. Here’s how to get ahead of the security changes that will inevitably come to the platform.By Susan Bradley May 08, 2024 6 minsWindows SecurityThreat and Vulnerability ManagementNetwork Securityhow-toDownload the Zero Trust network access (ZTNA) enterprise buyer’s guideFrom the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what ZTNA can do for their organizations and how to choose the right solution.By Josh Fruhlinger and steve_zurier May 06, 2024 1 minZero TrustAccess ControlNetwork Securitynews analysisChinese threat actor engaged in multi-year DNS resolver probing effortThe unusual and persistent probing activity over the span of multiple years should be a reminder to organizations to identify and remove all open DNS resolvers from their networks.By Lucian Constantin Apr 30, 2024 7 minsCyberattacksNetwork SecuritynewsMost attacks affecting SMBs target five older vulnerabilitiesAttackers target flaws for a reason: Even years after they are discovered, they still work. By John E. Dunn Apr 30, 2024 4 minsThreat and Vulnerability ManagementNetwork SecurityVulnerabilitiesfeatureLooking outside: How to protect against non-Windows network vulnerabilitiesSecurity administrators who work in Windows-based environments should heed the lessons inherent in recent vulnerability reports.By Susan Bradley Apr 25, 2024 7 minsWindows SecurityNetwork SecuritySecurity Practices Show more Show less View all Resources whitepaper Full Content Inspection: The New Standard in Network Security Trinity Cyber disrupts the hackers and adversaries and the unique tools and methods they employ – a much smaller data set with a much bigger payoff. The post Full Content Inspection: The New Standard in Network Security appeared first on Whitepaper Repository –. By Trinity Cyber 11 Jul 2024Business OperationsNetwork SecuritySecurity whitepaper Dynamic Network Segmentation A Must-Have for Digital Businesses in the Age of Zero Trust By ForeScout Technologies 08 Jul 2024Business OperationsNetwork SecuritySecurity whitepaper Network and Connectivity Trends for 2024 and Beyond By Comcast Business 08 Jul 2024Business OperationsData and Information SecurityNetwork Security View all Podcasts podcastsSponsored by CiscoSecure Remote Working: what we’ve learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.0 episodeRemote Access Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Aug 10, 202032 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Aug 10, 202026 mins Security Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What’s driving demand and how providers’ capabilities differ Oct 15, 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO