Network Security | News, how-tos, features, reviews, and videos
If you’re looking for a VPN alternative, mesh VPNs could be the answer. Here’s the business case for and against making the switch — and how to get started with mesh VPN Tailscale.
BAS products simulate attacks to test a company’s defenses against threat vectors. This guide can help you make the right choice for your organization.
Six key tips for upgrading to the latest version of the Wi-Fi Protected Access standard.
From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what SASE (Secure Access Service Edge) and SSE (Secure Service Edge) can do for their organizations and how t
From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what ZTNA can do for their organizations and how to choose the right solution.
Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing threat.
Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use.
Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.
Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.
Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.