Hardware/Network

Back to homepage

Why we need to secure IoT connections sooner than later

IoT products offer many conveniences but there are massive amounts of data being transferred to and from these services vulnerable to attack if left unsecured. In this podcast, Mike Nelson,

Taking Cloud-Based Disaster Recovery (DR) to the Next Level with an SDP Client and Smart Endpoints

By Don Boxely, CEO and Co- Founder at DH2i, Trepidations regarding data protection, privacy and security data protection/privacy—especially disaster recovery (DR)—are driving many organizations to pursue cybersecurity in the cloud.

Endpoint Security: Chain Of Trust Or Chain Of Fools?

The concept of trust is getting more attention these days. IDC has estimated security spending to reach $151 billion by 2023, noting a ‘C-level focus on trust’ as a key growth driver.

COVID-19: With everyone working from home, VPN security has now become paramount

DHS, SANS, NJCCIC, and Radware warn companies about securing enterprise VPN servers in the midst of the coronavirus outbreak and when a vast majority of employees are working from home.

Security is leaving the data center and moving to the edge

The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete. A 2019 study by

Why Automation Holds the Key to Security Governance and a Culture of Collaboration

A typical FTSE 100 or Fortune 500 company has a vast and complex set of cybersecurity defenses in place; managed by multiple security operations teams spread across different business units

Number of open source vulnerabilities surged in 2019

The number of disclosed open source software vulnerabilities in 2019 reached over 6000, up from just over 4,000 in 2018, a new WhiteSource report says.“This can be attributed to the

DNS over HTTPS misuse or abuse: How to stay secure

Firefox and Chrome have recently begun supporting external DNS resolvers in the cloud. The use of these DNS services bypasses controls that enterprise IT organizations put in place to prevent

Phishing is a huge concern among security decision-makers and influencers

A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects and security operations analysts) perceive phishing prevention,

DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile

Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons. Click here to view original webpage at www.darkreading.com