newsFortinet expands security lineup with sovereign SASEThe new Fortinet Sovereign SASE offering provides a delivery option that lets organizations maintain local control over security inspection and logs.By Sean Michael Kerner29 Aug 20241 minNetwork Security news F5, Intel team up to boost AI delivery, security By Michael Cooney29 Aug 20241 minNetwork SecurityArtificial IntelligenceSecuritynews China’s Volt Typhoon exploits Versa zero-day to hack US ISPs and IT firmsBy Lucian Constantin27 Aug 20245 minsAdvanced Persistent ThreatsTechnology IndustryCyberattacks news analysisChinese APT group Velvet Ant deployed custom backdoor on Cisco Nexus switchesBy Lucian Constantin 23 Aug 20244 minsAdvanced Persistent ThreatsNetwork SecurityVulnerabilities news analysisAttackers increasingly using legitimate remote management tools to hack enterprisesBy John Leyden 21 Aug 20247 minsHackingSecurity Monitoring SoftwareNetwork Security how-toDownload the network observability tools enterprise buyer’s guideBy Denise Dubie 13 Aug 20241 minNetwork SecurityEnterprise Buyer’s Guides newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management featureSwitcher’s guide to mesh VPNs: Pros, cons, and how to set up key featuresBy Tim Ferrill 05 Aug 202412 minsZero TrustNetwork Security feature7 network security startups to watchBy Jeff Vance 02 Aug 20241 minStartupsNetwork Security Articlesfeature2024 Olympics put cybersecurity teams on high alertEscalating cyberthreats, hacktivism, and cyber espionage suggest the Paris Games may present the greatest cybersecurity risk ever. Here’s what to look out for and how to prep.By Christine Wong 29 Jul 2024 9 minsCyberattacksIncident ResponseData and Information SecuritynewsPort shadow: Yet another VPN weakness ripe for exploitSharing connection information could be a problem among users of the same VPN server without proper protection, researchers have found. Corporate VPN servers in particular are vulnerable to the flaw.By David Strom 24 Jul 2024 5 minsInternet SecurityNetwork Securitynews analysisICS malware FrostyGoop disrupted heating in Ukraine, remains threat to OT worldwideThe malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.By Lucian Constantin 23 Jul 2024 5 minsMalwareCritical InfrastructureNetwork SecurityfeatureNHIs may be your biggest — and most neglected — security holeBecause IT has so little visibility into non-human identities, attackers are increasingly seeking them out as ultra-easy onramps to everything of value in your enterprise. The solution? Stop treating NHIs as though they are another human end-user.By Evan Schuman 23 Jul 2024 9 minsApplication SecurityIdentity and Access ManagementNetwork SecurityfeatureHashcat explained: How this password cracker worksBeyond its criminal uses, hashcat is a must-have tool for penetration testers, sysadmins, and researchers to test system security, check password strength, and validate the strength of cryptographic algorithms.By J.M. Porup 19 Jul 2024 7 minsPasswordsNetwork SecuritySecurityopinionBeware the tools that can bring risk to a Windows networkVigilance and regular reviews of network assets and policies can help avoid attacks that take advantage of access points created by legacy software and moves into the cloud. By Susan Bradley 18 Jul 2024 8 minsNetwork AdministratorWindows SecurityCloud SecuritybrandpostSponsored by Trinity CyberIntroducing Full Content Inspection: The New Standard in Network Security, and Why it’s NecessaryAlert Overload? There's a Better Way to Secure Your Network.By Trinity Cyber 17 Jul 2024 4 minsNetwork SecuritynewsCisco Talos analyzes attack chains, network ransomware tacticsRansomware actors often prioritize gaining initial access to targeted networks, says Cisco’s Talos security intelligence group.By Michael Cooney 11 Jul 2024 1 minRansomwareNetwork Securitynews analysisMD5 attack puts RADIUS networks everywhere at riskA design flaw in the decades-old RADIUS authentication protocol allows attackers to take over network devices from a man-in-the-middle position by exploiting MD5 hash collisions.By Lucian Constantin 09 Jul 2024 7 minsCyberattacksNetwork SecurityfeatureCisco adds heft to cybersecurity push with acquisitions, new talentCisco aims to relieve beleaguered network and security teams with its AI-driven, platform-based approach to enterprise security.By Bob Violino 09 Jul 2024 1 minNetwork SecurityfeatureFake network traffic is on the rise — here's how to counter itThe increasing volume and sophistication of fake network traffic has raised the cybersecurity stakes, jeopardizing sales and marketing efforts and complicating defense and protection.By Mary K. Pratt 09 Jul 2024 12 minsThreat and Vulnerability ManagementData and Information SecurityNetwork SecuritynewsCisco patches actively exploited zero-day flaw in Nexus switchesThe moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant. By Lucian Constantin 02 Jul 2024 4 minsThreat and Vulnerability ManagementZero-day vulnerabilityNetwork Security Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Video on demand videoGet up to speed on SASE: What’s driving demand and how providers’ capabilities differAs enterprises build up their mobile, edge and cloud deployments, they’re being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what’s driving demand for SASE, how SASE providers’ capabilities differ, and the skills companies need to get started. 15 Oct 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) 25 Jun 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? 30 Apr 2018 FirewallsNetwork MonitoringNetwork Security Is it time to kill the pen test? | Salted Hash Ep 22 18 Apr 2018 12 minsHackingNetwork MonitoringCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO