Network Security

Network security news, trends, analysis and practical advice

NSA - National Security Agency

Ukraine power grid hack: What happened and what needs to change?

A former CISO in a critical infrastructure sector shares his thoughts


insider threats

11 tips for spotting insider threats

Security pros are constantly being warned about insider threats. We’re told our companies need next-generation software, integrated threat intelligence, and the ability to correlate massive amounts of event logs and context to arm...

BBC DDoS

Who is New World Hacking? BBC hit by DDoS as anti-IS test card

The BBC -- that mainstay of British broadcasting, education, journalism, and whatever Top Gear was -- is ruing the day someone dropped a cup of tea into the server. Or perhaps it was a distributed-denial-of-service attack...

afraid of technology fear paranoia horror intimidated computer components 000002886100

Information security -- don't let the apparent complexity intimidate you

Those of us who spend most of our time immersed in the intricacies of information security are quite comfortable with the free use of terms like threat intelligence, defense-in-depth and forensics. The apparent complexity of...

Wifi billboard

To share or not to share -- a look at Guest Wi-Fi networks

Guest networks are a great Wi-Fi security feature offering multiple advantages. Read why you may want to try them out.

network components in closet

Those devices hidden in your closet CAN hurt you

If you take a quick look at the closets and storage rooms in your organizations, you will likely find various networked devices that have been installed, and probably forgotten. The problem is made worse by miscellaneous networked...

dlink.860l.620w

The D-Link DIR860L router -- how secure can it get?

This is a router review like no other. It is focused solely on the security aspects of the D-Link DIR-860L router, comparing it to my checklist of security features at RouterSecurity.org.

security incidents

Network security primer: Access control

Access control is a complicated technology that’s key to strong security.

best vpn routers smb 1

How secure can your router get?

No matter how much tweaking is done, a router can only be made as secure as the firmware (operating system) allows. Routers vary drastically in in their security features, yet the subject never comes up in reviews.

pirate flag skull pirate

The rise of the hacker next door or across the world: Your customers get it. How about your CEO?

Crisis-level security breaches frighten consumers and IT professionals alike, but that's no guarantee for funding to strengthen database defense forces, a task on which your job increasingly depends. Build your case by driving home...

Is your information security program giving you static?

Unfortunately, the bad actors in the information security world have far more time to spend breaking into our systems than we have to protect them. This creates a constantly changing threat landscape. A static approach to protecting...

stacks of money

To get new initiatives done, money talks

A couple of worthwhile security initiatives will languish if staffers have no incentive to work on them. Solution? Tie them to bonus pay.

Strengthen network security with Passive DNS

Collecting and analyzing Passive DNS data can help identify malicious sites and combat phishing and malware; here’s how to get started.

ip camera

Attackers hijack CCTV cameras to launch DDoS attacks

A recently detected distributed denial-of-service (DDoS) attack was launched from 900 compromised CCTV cameras that were hijacked by hackers.

clock

Researchers warn computer clocks can be easily scrambled

Researchers from Boston University sat they've found several flaws in NTP that could undermine encrypted communications and even jam up bitcoin transactions.

Digital Key

Mozilla mulls early cutoff for SHA-1 digital certificates

Mozilla is considering banning digital certificates signed with the SHA-1 algorithm in July 2016.

0 title9reasons

9 reasons why users still struggle with online security

How secure are you?Image by Flickr: amenclinicsphotos acWhen it comes to online security, experts and users don’t always agree on the most effective ways to stay safe, according to a new report from Google.The company surveyed 294...

NDN hackathon

IP was middle school; named data networking is college

Much of the Named Data Networking (NDN) project codebase is still at the Version zero-dot-something level. But things are nevertheless starting to get real for this architecture designed to blast past today’s host-based and...

fireeye logo

Security companies shouldn’t be this thin-skinned

FireEye, like all companies, wants to protect its intellectual property. But it needs to realize that security companies aren’t perceived like other companies.

Load More