newsFortinet expands security lineup with sovereign SASEThe new Fortinet Sovereign SASE offering provides a delivery option that lets organizations maintain local control over security inspection and logs.By Sean Michael Kerner29 Aug 20241 minNetwork Security news F5, Intel team up to boost AI delivery, security By Michael Cooney29 Aug 20241 minNetwork SecurityArtificial IntelligenceSecuritynews China’s Volt Typhoon exploits Versa zero-day to hack US ISPs and IT firmsBy Lucian Constantin27 Aug 20245 minsAdvanced Persistent ThreatsTechnology IndustryCyberattacks feature2024 Olympics put cybersecurity teams on high alertBy Christine Wong 29 Jul 20249 minsCyberattacksIncident ResponseData and Information Security newsPort shadow: Yet another VPN weakness ripe for exploitBy David Strom 24 Jul 20245 minsInternet SecurityNetwork Security news analysisICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwideBy Lucian Constantin 23 Jul 20245 minsMalwareCritical InfrastructureNetwork Security featureNHIs may be your biggest — and most neglected — security holeBy Evan Schuman 23 Jul 20249 minsApplication SecurityIdentity and Access ManagementNetwork Security featureHashcat explained: How this password cracker worksBy J.M. Porup 19 Jul 20247 minsPasswordsNetwork SecuritySecurity opinionBeware the tools that can bring risk to a Windows networkBy Susan Bradley 18 Jul 20248 minsNetwork AdministratorWindows SecurityCloud Security ArticlesbrandpostSponsored by Trinity CyberIntroducing Full Content Inspection: The New Standard in Network Security, and Why it’s NecessaryAlert Overload? There's a Better Way to Secure Your Network.By Trinity Cyber 17 Jul 2024 4 minsNetwork SecuritynewsCisco Talos analyzes attack chains, network ransomware tacticsRansomware actors often prioritize gaining initial access to targeted networks, says Cisco’s Talos security intelligence group.By Michael Cooney 11 Jul 2024 1 minRansomwareNetwork Securitynews analysisMD5 attack puts RADIUS networks everywhere at riskA design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions.By Lucian Constantin 09 Jul 2024 7 minsCyberattacksNetwork SecurityfeatureCisco adds heft to cybersecurity push with acquisitions, new talentCisco aims to relieve beleaguered network and security teams with its AI-driven, platform-based approach to enterprise security.By Bob Violino 09 Jul 2024 1 minNetwork SecurityfeatureFake network traffic is on the rise — here's how to counter itThe increasing volume and sophistication of fake network traffic has raised the cybersecurity stakes, jeopardizing sales and marketing efforts and complicating defense and protection.By Mary K. Pratt 09 Jul 2024 12 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsCisco patches actively exploited zero-day flaw in Nexus switchesThe moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant. By Lucian Constantin 02 Jul 2024 4 minsThreat and Vulnerability ManagementZero-day vulnerabilityNetwork Securityfeature10 most powerful cybersecurity companies todayWith AI and generative AI capabilities on the rise, a shift toward consolidation and platforms over point solutions is redefining the IT security market — as well as its leading vendors.By Neal Weinberg 02 Jul 2024 14 minsAccess ControlIdentity Management SolutionsMcAfeenewsTata Communications partners with Versa Networks on hosted SASEHybrid work, SD-WAN, and digital-first adoption make enterprises more vulnerable to attack, increasing the need for SSE solutions, the company says.By Lynn Greiner 21 Jun 2024 3 minsCloud SecurityNetwork SecuritynewsHow AWS secures its infrastructure with SonarisWith Sonaris, an internally developed tool, AWS continuously monitors its systems to pre-empt attacks on customer data.By Shweta Sharma 20 Jun 2024 1 minCloud SecurityNetwork SecuritynewsNetskope secures SaaS apps with genAIEnhancements to Netskope’s cloud access security broker (CASB) module aim to secure the use of genAI and SaaS applications.By Denise Dubie 11 Jun 2024 1 minNetwork SecurityfeatureWhitelisting explained: How it works and where it fits in a security programWhitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle?By Josh Fruhlinger and CSO Staff 07 Jun 2024 10 minsEmail SecurityApplication SecurityData and Information SecurityfeatureWhat are non-human identities and why do they matter?When digital systems need access and permissions they require credentials just like human beings. These non-human identities allow many components of complex systems to work together but present significant security issues.By Chris Hughes 03 Jun 2024 8 minsAccess ControlIdentity and Access ManagementNetwork Security Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper The Evolving Role of the Australian Cyber Security Centre in Safeguarding Australians from Cyber Threats By LastPass 23 Aug 2024CyberattacksCybercrimeSecurity whitepaper Global Data Insights Survey: Empowering the Data and AI-Ready Enterprise By Digital Realty Trust, L.P. 16 Aug 2024Artificial IntelligenceBusiness OperationsData and Information Security View all Video on demand videoGet up to speed on SASE: What’s driving demand and how providers’ capabilities differAs enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what’s driving demand for SASE, how SASE providers’ capabilities differ, and the skills companies need to get started. 15 Oct 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security Is it time to kill the pen test? | Salted Hash Ep 22 18 Apr 2018 12 minsHackingNetwork MonitoringCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO