Menu

network security - News, Features, and Slideshows

News about network security
  • Palo Alto CEO: Beware the Internet of Things – and watch your car

    Corporate IT security pros need to consider the Internet of Things as a new and dangerous attack vector oh, and we all should be particularly worried about the safety of our cars, says the top executive at Palo Alto Networks.

    Written by Tim Greene05 May 15 01:10
  • A true story of combating a large-scale DDoS attack

    Real tales of cyberattack response and recovery are hard to come by because organizations are reluctant to share details for a host of legitimate reasons, not the least of which is the potential for negative financial fallout. However, if we never tell our stories we doom others to blindly walk our path. Better to share our real-world battlefield experiences and become contributors to improved threat intelligence.

    Written by By Adrian Newby, CTO, CrownPeak15 April 15 05:32
  • A new kind of DDoS threat: The "Nonsense Name" attack

    There's a new species of Distributed Denial of Service (DDoS) attack targeting name servers, which could be called the "nonsense name" attack. It can wreak havoc on recursive and authoritative name servers alike, and some of our customers at Infoblox have fallen victim to it--but it's not always clear whether they were actually the targets.

    Written by By Cricket Liu, Chief Infrastructure Officer, Infoblox28 Jan. 15 08:39
Tutorials about network security
  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Cody Cornell, founder and CEO, Swimlane06 June 15 06:51
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    Written by By Lior Div, Co-founder and CEO, Cybereason06 June 15 00:37
  • How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

    Written by By Michael Crouse28 June 14 04:12
  • Record patch Tuesday: What you need to know

    Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.

    Written by Tony Bradley15 Dec. 10 07:13
Features about network security
  • Network analysis is like turning over rocks

    I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.

    Written by By J.F. Rice20 June 15 05:06
  • Your next digital security guard should be more like RoboCop

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Mike Paquette, VP of Security Products, Prelert05 June 15 07:00
  • The best way to stop DDoS attacks

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Rene Paap, product marketing manager, A10 Networks06 April 15 22:54
  • Information overload, SIEM version

    It's been over a year since <a href="http://www.computerworld.com/article/2486501/security0/security-manager-s-journal--giving-thanks-for-siem.html">I last wrote about my security information and event management (SIEM) platform</a> -- and a lot has happened since then. Back then, I wrote, "Now that my SIEM has been in operation for several months, I've become completely dependent on it, not only for security monitoring, but also for overall awareness of my network."

    Written by By J.F. Rice05 March 15 23:14
  • Lessons from the Sony breach in risk management and business resiliency

    2014 made it clear that cybercrime affects everyone. From retailers to banks, consumer goods companies and health care, there isn't an industry left untouched by cybercriminals looking to disrupt, steal or embarrass. So what has to change? The recent Sony attack and countless other examples point to the need for board members and executives to consider cybersecurity under the concept of risk management and business resilience.

    Written by By Adam Meyer, Chief Security Strategist, SurfWatch Labs, a cyber risk intelligence company10 Jan. 15 05:08

Whitepapers about network security

Computerworld
ARN
Techworld
CMO