Security

Security | News, how-tos, features, reviews, and videos

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

hand at keyboard with Windows logo

Windows 10 1909: What's in it for enterprises?

This fall's update for Windows 10 may not include a raft of new features, but it does offer something even more important to enterprise IT: extended support that should make future upgrades easier to manage.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

10 most-read articles on Insider Pro this week

What are your colleagues – or your competitors – reading on Insider Pro? These are our 10 most popular articles this week.

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

ip guide to top security certifications tablet

Guide to top security certifications

Security professionals are in demand and with the right certification, you’re in even higher demand. To help you decide which certs are for you, we’ve compiled a list of top security certifications -- broken down by category...

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

5G mobile wireless network technology emerging from smartphone

Privacy by design: Cybersecurity and the future of 5G

History has shown that when we rush to expand computing power and interconnectivity – IoT and cloud tech, to name two – we expose ourselves to new kinds of cyberattacks and bad actors. Can we get it right with 5G?

GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

digital currency

How blockchain is becoming the 5G of the payment industry

New blockchain-based financial networks like the one launched by IBM last week will enable faster and more transparent cross-border payments and eventually become the platform for retail and other consumer transactions.

big data merger and acquisition big business smb

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019.

passwords / authentication

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

passwords / authentication

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

Windows security and protection [Windows logo/locks]

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

Load More