network security

Visit/security/vulnerability/354867/billion-plus-wi-fi-devices-hit-by-kr00k-vulnerability
vulnerability

Billion-plus Wi-Fi devices hit by serious Kr00k vulnerability

The flaw chiefly affects Broadcom and Cypress Wi-Fi chips and is related to the infamous KRACK attacks
27 Feb 2020
Visit/security/network-security/354623/cisco-fixes-critical-flaw-in-network-management-platform
network security

Cisco fixes critical flaw in network management platform

The latest security hole is patched just days before the firm’s flagship Cisco Live 2020 conference
24 Jan 2020
Visit/mobile/5g/354286/why-5g-could-be-a-cyber-security-nightmare
5G

Why 5G could be a cyber security nightmare

The latest generation of mobile connectivity promises many marvellous things, but it could also be a hacker's dream
6 Dec 2019
Visit/security/network-security/354040/how-your-network-can-take-on-the-cloud-and-win
network securitywhitepaper

How your network can take on the cloud - and win

Think beyond traditional networking toward a secure digital perimeter
15 Nov 2019
Advertisement
Visit/security/network-security/354135/patch-management-best-practices
network securitywhitepaper

Patch management best practices

Reduce your patch management workload
5 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Visit/security/34708/never-give-humans-the-keys-to-your-kingdom-say-goldman-sachs-security-chiefs
Security

Humans 'unfit' to handle access managment, say Goldman Sachs

Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019
Visit/google-android/34657/android-gets-new-security-sandboxing-features
Google Android

Android gets new security sandboxing features

Google brings mobile site isolation to Chrome to protect against ‘Spectre-like’ attacks
18 Oct 2019
Advertisement
Visit/security/34488/thousands-of-webcams-vulnerable-to-attack
Security

Thousands of webcams vulnerable to attack

Exposed connections could lead to loss of privacy or information theft
25 Sep 2019
Visit/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso
Magnus Carling
Security

Modern cyber security bears 'great resemblance to Titanic'

The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019
Advertisement
Visit/denial-of-service-dos/34353/ncsc-issues-dos-guidance-following-wikipedia-attack
DoS mockup
denial of service (DOS)

NCSC issues DoS guidance following Wikipedia attack

The popular online knowledge sharing website experienced large outages at the weekened, prompting a response from Britain's cyber body
9 Sep 2019
Visit/security/34153/microsoft-observes-russian-hackers-actively-attacking-businesses-through-iot-devices
Growling Grizzly bear with Russian hat
Security

Russian hackers are attacking businesses through IoT devices

The group known as Fancy Bear has played a role in some of the biggest hacks of recent years
6 Aug 2019
Visit/security/33537/what-is-shadow-it
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
19 Jul 2019
Visit/network-internet/34051/kazakh-government-will-intercept-the-nation-s-https-traffic
Network & Internet

Kazakh government will intercept the nation’s HTTPS traffic

The latest authoritarian attempt to regulate web usage involves launching MitM attacks against every citizen
19 Jul 2019
Advertisement
Visit/security/34006/nhs-anaesthetic-machines-vulnerable-to-hackers
Security

NHS anaesthetic machines vulnerable to hackers

Devices can be remotely controlled to deliver life-threatening anaesthetic doses
11 Jul 2019
Visit/security/33946/50-of-cyber-attacks-now-use-island-hopping
City office buildings image with overlay of security padlocks and network showing a data breach
Security

50% of cyber attacks now use island hopping

Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
Visit/security/network-security/354363/the-network-architects-guide-to-adopting-a-software-defined
network securitywhitepaper

The network architect’s guide to adopting a software-defined perimeter

Deliver the experience your users want, with the security it needs
28 Jun 2019
Visit/cloud/cloud-security/354360/the-definitive-guide-to-branch-transformation
cloud securitywhitepaper

The definitive guide to branch transformation

Five requirements for architecting the ideal solution
28 Jun 2019
Visit/network-internet/31914/what-is-network-intelligence
Brain, network, network intelligence, AI, computing, connected, artificial intelligence, machine learning
Network & Internet

What is Network Intelligence?

A look at the technology enabling businesses to analyse data packets in real-time
3 Jun 2019
Visit/cyber-attacks/33644/microsoft-fixes-critical-flaw-in-legacy-windows-systems-to-prevent-wannacry-like
hacking and ransomware
cyber attacks

Microsoft fixes critical RCE flaws in legacy Windows systems

Windows 7 and XP machines are at risk of autonomously spreading malware between PCs and networks
15 May 2019
Advertisement
Visit/network-internet/domain-name-system-dns/354105/how-a-dns-firewall-can-help-battle-against-advanced
Domain Name System (DNS)whitepaper

How a DNS firewall can help battle against advanced cyber threats

Protect your business against advanced persistent threats and similar malware
7 May 2019
Visit/network-internet/domain-name-system-dns/354104/assessing-the-dns-security-risk
Domain Name System (DNS)whitepaper

Assessing the DNS security risk

Discover how IT professionals around the world assess and mitigate DNS risks
7 May 2019
Visit/security/endpoint-security/354103/exposing-the-threat-of-shadow-devices
endpoint securitywhitepaper

Exposing the threat of shadow devices

Do you know what’s lurking on your network?
7 May 2019