Tag "Network Security"

Back to homepage
Hardware/Network

With the growing infrastructure, there’s a huge demand for cybersecurity in India: Stephan Neumeier

With the growth of IoT and 5G, we will have more and more digital devices being connected to the internet in the future. However, most of those devices will not

Hardware/Network

Improving the security, privacy and safety of future connected vehicles

The security, privacy and safety of connected autonomous vehicles (CAVs) has been improved thanks to testing at WMG, University of Warwick. CAVs can now connect to each other, roadside infrastructure,

Hardware/Network

Vulnerabilities in IoT Devices Have Doubled Since 2013

A follow-up study into the security of IoT devices has revealed more than twice the number of vulnerabilities as were detected six years ago.  In the 2013 study SOHOpelessly Broken 1.0,

Hardware/Network

Most Port Vulnerabilities Are Found in Three Ports

The vast majority of vulnerabilities in ports are found in just three, making it theoretically easier for organizations to defend them against attack, according to Alert Logic. The security vendor analyzed

Hardware/Network

Avoid Bad Security Buying Decisions

Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands and creates new and greater vulnerabilities, organizations know they need to enhance

Hardware/Network

#HowTo Combat the Insider Threat

Insider threats pose a huge risk to business security, be it employees, both present and past, or freelancers and contractors. These users have an elevated level of access to privileged

Hardware/Network Software

Threat visibility is imperative, but it’s even more essential to act

Cyberthreats are escalating faster than many organizations can identify, block and mitigate them. Visibility into the expanding threat landscape is imperative, but according to a new threat report released by CenturyLink, it is even

Network Security

Security leaders lack confidence in the supply chain, fear third-party attacks

An overwhelming number of cybersecurity professionals (89%) have expressed concerns about the third-party managed service providers (MSPs) they partner with being hacked, according to new research from the Neustar International

Hardware/Network

IIoT security challenges: Dealing with cutting edge technologies

Dr. Jesus Molina is the Director of Business Development at Waterfall Security Solutions, and in this interview with Help Net Security he talks about the security issues related to emerging technologies.What

Hardware/Network IT Compliance

Regulations are driving innovation toward an identity layer on the Internet

The security community often points to the inherent lack of an encryption layer on the Internet as a factor behind many of the related threat vectors. The decentralized nature of