Network Security | News, how-tos, features, reviews, and videos
Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing threat.
As the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.
Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use.
Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.
Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.
Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.
Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.
Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.
Virtual private networks still have a place in the enterprise for protecting data and networks. Here's what you need to know when selecting a VPN.
A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.