Network Security | News, how-tos, features, reviews, and videos
Proofpoint threat intelligence shows daily URL-based threats top 4.5 million daily. New pre-delivery suspicious URL hold capability helps you put up a sound defense.
Common tactics and attack scenarios used in business email compromise, and how a multilayered approach helps thwart them.
If you’re looking for a VPN alternative, mesh VPNs could be the answer. Here’s the business case for and against making the switch — and how to started with mesh VPN Tailscale.
Need to secure non-human entities, leaky clouds, and complex environments? These 7 network security startups have bold ideas.
Attack discovered by Guardio researchers shows how criminals can bypass email protections such as DKIM and SPF.
Escalating cyberthreats, hacktivism, and cyber espionage suggest the Paris Games may present the greatest cybersecurity risk ever. Here’s what to look out for and how to prep.
The Domain Name System Security Extensions provides cryptographic authentication to prevent redirection to rogue websites, but owners of many domains have yet to adopt it.
Sharing connection information could be a problem among users of the same VPN server without proper protection, researchers have found. Corporate VPN servers in particular are vulnerable to the flaw.
The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.
Because IT has so little visibility into non-human identities, attackers are increasingly seeking them out as ultra-easy onramps to everything of value in your enterprise. The solution? Stop treating NHIs as though they are another human end-user.