Network Security

Network security news, trends, analysis and practical advice

microsoft headquarters
swift security breaches

TP-LINK lost control of two domains used to configure routers and Wi-Fi extenders

TP-LINK is no longer in control of or They do still control What does this mean to owners of TP-LINK devices? Probably not much.

Lessons and observations from the GoToMyPC incident

Citrix did not distinguish itself in the way it handled a recent security incident. Then too, neither did the press.

20160614 128 technology routing vendor ceo andy ory

Free network software might radically change how routing works

Startup 128 Technology is a fundamentally different approach to routing, one that the company says will make networking simpler and more secure.

Data analytics, big data, business, chart, laptop

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and domains that can now be registered on the public...

20151005 Cisco headquarters sign

Cisco patches high-severity flaws in its Web Security Appliance

Cisco Systems has fixed four denial-of-service vulnerabilities that attackers could exploit to cause Web Security Appliance devices to stop processing traffic correctly.

iphone security

Opera offers iPhone users free VPN, with strings attached

Opera Software yesterday released a free VPN app for Apple's iOS.

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...


Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will help you communicate the challenges, learn from success stories and dive into the most valuable features of today's identity...

20160225 stock mwc ericsson booth security locks

This startup uses math to show whether your network is safe

How do you know your network is safe from attacks and failures? Veriflow, a startup with backing from the U.S. Defense Department, says it can make sure.

generic image of a wi-fi router

New firmware analysis framework finds serious flaws in Netgear and D-Link devices

A team of security researchers found serious vulnerabilities in more than a dozen wireless routers and access points from Netgear and D-Link with the help of an open-source framework that can be used to perform dynamic security...

train wreck at montparnasse

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease administrative tasks, it can also create new vulnerabilities. Experts offer advice for security teams.

NSA - National Security Agency

Defending a network from the NSA

In a recent security conference, the head of the TAO division of the NSA offered advice on making his job harder. Their biggest asset is competence and persistence, rather than zero day vulnerabilities.

Ukraine power grid hack: What happened and what needs to change?

A former CISO in a critical infrastructure sector shares his thoughts

insider threats

11 tips for spotting insider threats

Security pros are constantly being warned about insider threats. We’re told our companies need next-generation software, integrated threat intelligence, and the ability to correlate massive amounts of event logs and context to arm...


Who is New World Hacking? BBC hit by DDoS as anti-IS test card

The BBC -- that mainstay of British broadcasting, education, journalism, and whatever Top Gear was -- is ruing the day someone dropped a cup of tea into the server. Or perhaps it was a distributed-denial-of-service attack...

afraid of technology fear paranoia horror intimidated computer components 000002886100

Information security -- don't let the apparent complexity intimidate you

Those of us who spend most of our time immersed in the intricacies of information security are quite comfortable with the free use of terms like threat intelligence, defense-in-depth and forensics. The apparent complexity of...

Wifi billboard

To share or not to share -- a look at Guest Wi-Fi networks

Guest networks are a great Wi-Fi security feature offering multiple advantages. Read why you may want to try them out.

Load More