Network security
Enterprise cyberdefense strategies must include network security best practices. Get advice on essential network security topics such as remote access, VPNs, zero-trust security, NDR, endpoint management, IoT security, hybrid security, Secure Access Service Edge, mobile security and more.
Top Stories
-
News
13 Sep 2024
Fortinet confirms data breach, extortion demand
Fortinet confirmed that a threat actor stole data from a third-party cloud-based shared file drive, which affected a small number of customers, but many questions remain. Continue Reading
By- Arielle Waldman, News Writer
-
Answer
11 Sep 2024
HTTP vs. HTTPS: What's the difference?
HTTP and HTTPS are web communication protocols. HTTP lacks security, while HTTPS encrypts data to adhere to the security standards of confidentiality, integrity and authenticity. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
22 Jun 2018
Unprotected Firebase databases leaked over 100 million records
Android and iOS mobile apps that use unprotected Firebase databases leaked over 100 million records that include PHI, financial records and authentication information. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
22 Jun 2018
No more selling mobile location data, promise carriers
Sen. Ron Wyden got all major U.S. wireless carriers to promise not to sell mobile location data to third parties, but experts question the basic security practices in place. Continue Reading
By- Michael Heller, TechTarget
-
Feature
01 Jun 2018
Stranger things: IoT security concerns extend CISOs' reach
The internet of things has drastically expanded the scope of what enterprises need to protect, adding challenges big and small to CISOs' responsibilities. Continue Reading
-
News
01 Jun 2018
SS7 vulnerabilities enable breach of major cellular provider
News roundup: A major cellular network may have been compromised by exploiting SS7 vulnerabilities, according to reports. Plus, Kaspersky's lawsuits have been dismissed, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Answer
31 May 2018
How has a Broadcom flaw affected the Lenovo ThinkPad?
A previously disclosed flaw found in Broadcom's Wi-Fi controller chips is now believed to affect the Lenovo ThinkPad. Learn how this vulnerability works with expert Judith Myerson. Continue Reading
- 29 May 2018
-
News
17 May 2018
Securus hack exposes law enforcement customers of location tracking
Following news that it provides near real-time location data to law enforcement without warrants, a Securus hack exposed information on those law enforcement customers. Continue Reading
By- Michael Heller, TechTarget
-
Tip
09 May 2018
Protecting the DNS protocol: How DNSSEC can help
Securing the DNS protocol is no joke. Learn what the DNS Security Extensions are and the efforts the United States government is taking to push DNSSEC adoption. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Tip
09 May 2018
Ways to solve DNS security issues in your organization
Get up to speed fast on means and methods for reducing or eliminating security-related issues in DNS, an integral service upon which the internet depends. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Answer
04 May 2018
How will the new WPA3 protocol strengthen password security?
The development of WPA3 helps advance Wi-Fi protocol, as the next generation of Wi-Fi-enabled devices begins to demand more. Expert Michael Cobb explains how it differs from WPA2. Continue Reading
By -
News
26 Apr 2018
IXPs asked to mind their 'MANRS' to improve routing security
The Internet Society expands its Mutually Agreed Norms for Routing Security, or MANRS, to IXPs as a means to protect the internet from route hijacking, leaks and IP address spoofing. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
News
17 Apr 2018
Device wars: Researchers track new IoT botnet DDoS attacks
A variant of the Mirai IoT botnet is the suspected cause of distributed denial-of-service attacks on financial services companies earlier this year, according to Recorded Future. Continue Reading
-
News
16 Apr 2018
CrowdStrike Falcon X takes aim at incident response
CrowdStrike introduced a new component for the vendor's cloud-based security platform -- dubbed Falcon X -- that looks to speed up enterprises' incident response times. Continue Reading
By- Rob Wright, Senior News Director
-
News
13 Apr 2018
A UPnP vulnerability hides bad traffic in a new way
News roundup: Home routers are susceptible to a UPnP vulnerability that proxies bad traffic in a new way. Plus, AMD and Microsoft released patches for the Spectre flaw, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Feature
03 Apr 2018
New cloud threats as attackers embrace the power of cloud
Safeguarding your critical data is getting harder as threat actors embrace the advantages -- and missteps -- of cloud. Here's what to watch out for in 2018. Continue Reading
-
Answer
30 Mar 2018
What VPN alternatives should enterprises consider using?
VPN vulnerabilities in products from popular vendors were recently found to enable serious threats. Discover how detrimental these threats are and best alternatives to the use of VPNs. Continue Reading
-
News
01 Mar 2018
Memcrashed DDoS amplification exploits memcached UDP port
Memcrashed, a devastating new DDoS amplification attack that exploits UDP port 11211, is only possible when memcached servers are exposed to the public internet. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Answer
15 Feb 2018
How does the Devil's Ivy bug compromise security cameras?
The Devil's Ivy bug affects millions of internet-connected security cameras. Expert Judith Myerson explains how the exploit works and what can be done to prevent it. Continue Reading
-
News
30 Jan 2018
Critical Cisco ASA vulnerability patched against remote attacks
Experts urge users to patch a new Cisco ASA vulnerability that earned the most critical CVSS score of 10.0 and could lead to remote code execution and denial-of-service attacks. Continue Reading
By- Michael Heller, TechTarget
-
Tip
30 Jan 2018
Cryptojacking: How to navigate the bitcoin mining threat
Due to the rising value of bitcoin and other cryptocurrency, hackers have started to use cryptojacking to mine bitcoin. Learn what this means for end users with expert Nick Lewis. Continue Reading
By -
News
26 Jan 2018
A series of new IoT botnets plague connected devices
News roundup: New IoT botnets compromise tens of thousands of devices worldwide. Plus, Kaspersky Lab filed an injunction against DHS, mobile POS gets a PCI standard, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
19 Jan 2018
Okiru malware puts billions of connected devices at risk
News roundup: Okiru, a new Mirai variant, could put over 1.5 billion devices at risk of a botnet. Plus, G Suite Enterprise now comes with a security center, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Tip
17 Jan 2018
TLS 1.3: What it means for enterprise cloud use
The latest draft version of TLS 1.3 is out, and it will likely affect enterprises that use cloud services. Expert Ed Moyle explains the impact on users and their monitoring controls. Continue Reading
By- Ed Moyle, Drake Software
-
Tip
16 Jan 2018
What the OWASP IoT security project means for device creation
The OWASP IoT security project aims to get developers to incorporate security at the beginning of a device's life. Expert Ernie Hayden outlines how it is tackling the issue. Continue Reading
By- Ernie Hayden, 443 Consulting LLC
-
News
11 Jan 2018
WPA3 Wi-Fi protocol aims to improve security in 2018
The new WPA3 Wi-Fi protocol aims to improve security for IoT devices and strengthen password security with protections against brute force attacks. Continue Reading
By- Michael Heller, TechTarget
-
Tip
11 Jan 2018
Security compliance standards as a guide in endpoint plans
Consider security compliance regulations for your industry as a starting point and a guide for planning your specific approach to enterprise endpoint protection. Continue Reading
By -
Tip
11 Jan 2018
The endpoint security controls you should consider now
With the perimeter wall gone, securing enterprise endpoints is even more essential. Learn how automation and other developments can up endpoint protection now. Continue Reading
By -
Answer
11 Jan 2018
How should enterprise firewall settings be reviewed?
Getting firewall settings right is one of the most basic ways to protect enterprise data from accidental exposures. Expert Judith Myerson discusses how to review firewall policies. Continue Reading
-
Feature
08 Jan 2018
The top six EMM vendors offering MDM capabilities
With vendors expanding their horizons from just MDM to more comprehensive EMM products, it is crucial to look at these EMM vendors who offer MDM capabilities. Continue Reading
-
Feature
08 Jan 2018
Comparing the leading mobile device management products
Expert Matt Pascucci examines the top mobile device management offerings to help you determine which MDM products are the best fit for your organization. Continue Reading
-
Answer
08 Jan 2018
How can a BGP vulnerability in Cisco products be fixed?
A BGP vulnerability in some Cisco products enabled denial-of-service attacks. Expert Judith Myerson explains the vulnerability and how Cisco fixed the problem. Continue Reading
-
Feature
05 Jan 2018
Six questions to ask before buying enterprise MDM products
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
-
Feature
04 Jan 2018
Understand the basics of mobile device management products
Implementing MDM products has traditionally been the go-to answer for securing mobile devices, but with the role of mobile devices in the enterprise growing, admins need a more comprehensive security option. Continue Reading
-
Feature
04 Jan 2018
Three enterprise scenarios for MDM products
Expert Matt Pascucci outlines three enterprise uses cases for mobile device management products to see how they can protect users, devices and corporate data. Continue Reading
-
Answer
02 Jan 2018
Broadpwn flaw: How does the new iOS exploit compare?
An iOS exploit similar to the Broadpwn flaw was recently developed by a researcher at Google's Project Zero. Expert Kevin Beaver explains what the exploit is and how it works. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Blog Post
29 Dec 2017
Official TLS 1.3 release date: Still waiting, and that's OK
Protocol scrutiny is good for the upcoming TLS 1.3 update as the process continues to expose, and fix, problems. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Feature
15 Dec 2017
Three reasons to implement an NAC system
The growth in devices on the network has heightened the need for network access control products. This article presents scenarios where an enterprise might need an NAC system. Continue Reading
By- Rob Shapland, Falanx Cyber
-
Answer
15 Dec 2017
How can a vulnerability in Ruggedcom switches be mitigated?
Vulnerabilities in Ruggedcom switches could open the industrial switches and other communication devices up to attacks. Expert Judith Myerson explains how to mitigate the risks. Continue Reading
-
Answer
14 Dec 2017
Which 4G vulnerabilities should BYOD users be aware of?
Enterprises should consider pressing 4G vulnerabilities when developing a BYOD strategy for their employees. Expert Judith Myerson explains the flaws and what to do about them. Continue Reading
-
Answer
05 Dec 2017
iOS updates: Why are some Apple products behind on updates?
A study by Zimperium found that more than 23% of iOS devices aren't running the latest software. Matt Pascucci explains how this is possible, even though Apple controls iOS updates. Continue Reading
-
Answer
28 Nov 2017
How can attacks like the Cherry Blossom project be prevented?
With the WikiLeaks Cherry Blossom project, attackers can potentially inject malicious firmware into wireless routers. Expert Michael Cobb explains how to stop it from happening. Continue Reading
By -
Answer
16 Nov 2017
What QNAP vulnerabilities affect NAS storage device security?
QNAP vulnerabilities in NAS enabled attackers to control devices. Expert Judith Myerson explains each of the QNAP NAS vulnerabilities and their fixes. Continue Reading
-
Tip
09 Nov 2017
How to prepare for potential IPv6 DDoS attacks
Enterprises learn how to prepare for IPv6 with DDoS attack tools. Michael Cobb further addresses the inevitable attacks and what users can do. Continue Reading
By -
Answer
25 Oct 2017
How did a Windows Defender antivirus bug enable remote exploits?
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it happened, and what to do about it. Continue Reading
By -
News
17 Oct 2017
KRACK WPA2 flaw might be more hype than risk
Researchers discover a WPA2 vulnerability and brand it KRACK, but some experts say the early reports overstate the risk of the flaw and downplay the difficulty of an exploit. Continue Reading
By- Michael Heller, TechTarget
-
Answer
09 Oct 2017
How does an Amazon Echo vulnerability enable attackers to eavesdrop?
Hackers could take advantage of a physical Amazon Echo vulnerability to turn the Echo into a listening device. Judith Myerson explains how this works and what can be done about it. Continue Reading
-
News
06 Oct 2017
Dnsmasq server flaws unmasked and patched by Google
News roundup: Google researchers find and patch vulnerabilities in the Dnsmasq server that are used widely in routers and IoT devices. Plus, EU-U.S. Privacy Shield challenge and more. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tip
02 Oct 2017
Securing endpoints with supplementary tools protects data
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
By -
Answer
28 Sep 2017
How can a DDoS reflection attack abuse CLDAP?
A new exploit of CLDAP servers can be used for a DDoS reflection attack that gives attackers a 70x boost. Nick Lewis explains how to defend against this new threat. Continue Reading
By -
Answer
07 Sep 2017
How do network management systems simplify security?
Network security teams can find themselves overwhelmed with protecting an enterprise network. Expert Matthew Pascucci explains how network management systems can help with that. Continue Reading
-
Answer
05 Sep 2017
Should an enterprise BYOD strategy allow the use of Gmail?
Using personal Gmail accounts for business purposes is not a secure enterprise BYOD strategy. Expert Matthew Pascucci discusses why companies should avoid implementing this tactic. Continue Reading
-
Feature
25 Aug 2017
Learn what network access control systems can do for you
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
By- Rob Shapland, Falanx Cyber
-
Answer
25 Aug 2017
How is cross-platform malware carried in Word docs?
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks work and how to defend against them. Continue Reading
By -
News
04 Aug 2017
IoT device security bill mandates security standards
News roundup: U.S. Senators introduce a bipartisan bill to standardize IoT device security for government vendors. Plus, Anthem suffers another data breach, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Feature
02 Aug 2017
Symantec Endpoint Protection and the details for buyers to know
Expert Ed Tittel examines Symantec Endpoint Protection, an intrusion prevention, firewall and antimalware product for physical and virtual endpoints. Continue Reading
By -
Feature
02 Aug 2017
A closer look at Kaspersky antimalware protection services
Expert Ed Tittel looks at Kaspersky antimalware product Endpoint Security, which provides multilayered protection against malware, phishing attacks and other exploits. Continue Reading
By -
Feature
01 Aug 2017
Details of Trend Micro Worry-Free Business Security Services
Expert Ed Tittel takes a closer look at Trend Micro Worry-Free Business Security Services, an antivirus and antimalware product for small organizations. Continue Reading
By -
Feature
31 Jul 2017
Trend Micro OfficeScan endpoint protection software and its offerings
Expert contributor Ed Tittel takes a look at Trend Micro OfficeScan, an endpoint protection product with antivirus and antimalware functionality for physical and virtualized endpoints. Continue Reading
By -
Feature
31 Jul 2017
The various offers of Microsoft System Center Endpoint Protection
Expert Ed Tittel examines System Center Endpoint Protection, Microsoft's native Windows antivirus and antimalware security product. Continue Reading
By -
Answer
31 Jul 2017
Did DDoS attacks cause the FCC net neutrality site to go down?
The FCC net neutrality comment site crashed, and it was blamed on DDoS attacks. Expert Matthew Pascucci looks at the technical side of this incident and what was behind it. Continue Reading
-
Feature
28 Jul 2017
An in-depth look into McAfee Endpoint Threat Protection
McAfee Endpoint Threat Protection is an antimalware protection product that is designed to secure Windows systems against malware, data loss and other threats in standalone or networked environments. Continue Reading
By -
Answer
28 Jul 2017
Samsung Knox platform: Can it improve Android device security?
Application security expert Michael Cobb discusses the Samsung Knox platform and its ability to improve Android device security in the enterprise. Continue Reading
By -
Feature
27 Jul 2017
Sophos Endpoint Protection and an overview of its features
Expert Ed Tittel examines Sophos Endpoint Protection, an endpoint security platform with antivirus, antimalware and more. Continue Reading
By -
Tip
24 Jul 2017
IPv6 addresses: Security recommendations for usage
IPv6 addresses can be used in a number of ways that can strengthen information security. Expert Fernando Gont explains the basics of IPv6 address usage for enterprises. Continue Reading
By- Fernando Gont, SI6 Networks
-
Answer
19 Jul 2017
How does an Intel AMT flaw enable attackers to gain device access?
A vulnerability in Intel AMT enables attackers to gain remote access to PCs and devices. Expert Judith Myerson explains how the attack works and what can be done to prevent it. Continue Reading
-
Answer
14 Jul 2017
Android sandboxing tools: How can work data separation be bypassed?
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb explains how the attack works. Continue Reading
By -
Feature
13 Jul 2017
Evaluating endpoint security products for antimalware protection
Expert contributor Ed Tittel explores key criteria for evaluating endpoint security products to determine the best option for antimalware protection for your organization. Continue Reading
By -
Feature
10 Jul 2017
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints. Continue Reading
By- David Geer, Geer Communications
-
Opinion
10 Jul 2017
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
07 Jul 2017
Flawed Broadcom Wi-Fi chipsets get a fix, but flaw remains a mystery
Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more. Continue Reading
By- Madelyn Bacon, TechTarget
- 05 Jul 2017
- 05 Jul 2017
- 05 Jul 2017
-
Answer
04 Jul 2017
How did Webroot's antivirus signature update create false positives?
A Webroot antivirus signature update flagged Windows and Windows applications as dangerous. Expert Matthew Pascucci explains how it happened and what Webroot did about it. Continue Reading
-
News
22 Jun 2017
Malware in encrypted traffic uncovered with machine learning
Cisco claims it can accurately detect malware activity in encrypted traffic using machine learning, but some experts worry about privacy implications. Continue Reading
By- Michael Heller, TechTarget
-
Answer
20 Jun 2017
Heartbleed vulnerability: Why does it persist on so many services?
The Heartbleed flaw still impacts almost 200,000 services connected to the internet. Expert Nick Lewis explains why these services remain unpatched and vulnerable. Continue Reading
By -
News
16 Jun 2017
Hidden Cobra hackers target U.S. with DeltaCharlie malware
News roundup: DeltaCharlie malware is a threat to the U.S., according to a US-CERT warning about Hidden Cobra. Plus, a DVR flaw could create a bigger botnet than Mirai, and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Answer
15 Jun 2017
How do Linksys router vulnerabilities expose user data?
Router vulnerabilities in over 20 Linksys models expose user data to attackers. Expert Judith Myerson explains how the flaws work and how to protect against them. Continue Reading
-
Tip
13 Jun 2017
IPv6 update: A look at the security and privacy improvements
The recent IPv6 update from the IETF introduces new security and privacy recommendations. Expert Fernando Gont explains these changes and what they mean for organizations. Continue Reading
By- Fernando Gont, SI6 Networks
-
Answer
09 Jun 2017
How can a NULL pointer dereference flaw create a DoS attack?
A flaw in the open source graphics library libpng enabling denial-of-service attacks was discovered. Expert Michael Cobb explains how the vulnerability works. Continue Reading
By -
News
08 Jun 2017
Hardcoded passwords could cause full IoT camera compromise
IoT cameras could be fully compromised due to multiple vulnerabilities, including hardcoded passwords that can be used regardless of user settings. Continue Reading
By- Michael Heller, TechTarget
-
Answer
24 May 2017
How does the Stegano exploit kit use malvertising to spread?
A malvertising campaign by the AdGholas group has been found spreading the Stegano exploit kit. Expert Nick Lewis explains how web advertisements are used in this attack. Continue Reading
By -
Answer
23 May 2017
How does Rakos malware attack embedded Linux systems?
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on their systems. Continue Reading
By -
Answer
19 May 2017
Can BGP anycast addressing be used for DDoS attacks?
The BGP anycast addressing technique could potentially be used for malicious purposes. Expert Judith Myerson explains how this might work and what types of attacks to look out for. Continue Reading
-
News
19 May 2017
Q&A: Juniper's Kevin Walker on data manipulation, ransomware threats
Juniper's Kevin Walker talks with SearchSecurity about the evolving threat landscape and how some attackers are incorporating data manipulation into their schemes. Continue Reading
By- Rob Wright, Senior News Director
-
Answer
17 May 2017
How can a smart TV security vulnerability be mitigated?
A smart TV security vulnerability could potentially be exploited to steal the owner's data. Expert Judith Myerson explains how this works and offers tips on how to protect yourself. Continue Reading
-
Tip
16 May 2017
Why WPA2-PSK can be a security risk even with an uncracked key
WPA2-PSK is a popular way to bolster wireless security, but it's not perfect. Expert Joseph Granneman explains WPA2 and other aspects of the complicated history of Wi-Fi security. Continue Reading
By- Joseph Granneman, Illumination.io
-
News
09 May 2017
Intel AMT security risk could lead to system access
Servers may have been at risk of attack for years because of an Intel AMT security risk that was recently disclosed before manufacturers could patch. Continue Reading
By- Michael Heller, TechTarget
-
News
05 May 2017
SS7 vulnerability allows attackers to drain bank accounts
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more. Continue Reading
By- Madelyn Bacon, TechTarget
-
Tip
24 Apr 2017
The security pros and cons of using a free FTP tool
A free FTP tool can help move enterprise files to a managed file transfer service, but there are security factors to consider. Expert Judith Myerson explains what they are. Continue Reading
-
Answer
24 Apr 2017
How does Ticketbleed affect session ID security?
The Ticketbleed bug in some F5 Networks products caused session IDs and uninitialized memory to leak. Expert Judith Myerson explains what a session ID is and how attackers use it. Continue Reading
-
Answer
04 Apr 2017
How does a WebKit framework flaw enable denial-of-service attacks?
A vulnerability in Apple's WebKit framework allows attackers to initiate phone calls through mobile apps on victims' devices. Expert Michael Cobb explains how the attack works. Continue Reading
By -
Opinion
03 Apr 2017
Outsourcing security services rises as MSSPs focus on industries
Despite increasing levels of specialization, managed security service providers often don't understand the business you're in. That may be changing. Continue Reading
- 30 Mar 2017
-
Tip
28 Mar 2017
Android VPN apps: How to address privacy and security issues
New research on Android VPN apps revealed the extent of their privacy and security flaws. Expert Kevin Beaver explains how IT professionals can mitigate the risks. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
News
22 Mar 2017
HTTPS interception, middlebox models under fire
HTTPS interception in security products and services may be reducing security rather than improving it, according to US-CERT, which puts middleboxes in a precarious position. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Answer
20 Mar 2017
Pork Explosion Android flaw: How is it used to create a backdoor?
The Pork Explosion vulnerability present in some Foxconn-created app bootloaders can be used to create an Android backdoor. Expert Nick Lewis explains how the flaw works. Continue Reading
By -
Feature
15 Mar 2017
Pulse Connect Secure offers a variety of authentication options
Expert Karen Scarfone takes a look at the Pulse Connect Secure series of SSL VPNs for securing the connection between clients and networks through encrypted tunnels. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
15 Mar 2017
SonicWALL SSL VPN provides security for organizations of any size
The SonicWALL SSL VPN protects remote client devices by creating a secure connection to enterprise networks, with many options for customized security features. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
News
14 Mar 2017
Deprecated SHA-1 certificates trip up SAP Ariba
SHA-1 certificates are still in play, despite browser deprecation, as SAP Ariba advises legacy users to use unpatched browsers to avoid error messages, blocked access. Continue Reading
By- Peter Loshin, Former Senior Technology Editor