Network Security | News, how-tos, features, reviews, and videos
The planned shortening of the lifespan of TLS certificates to 90 days should ensure more security. However, many companies are not prepared, a survey found.
In a report identifying the most effective and popular subject lines used by phishing attackers, HR was tops, along with “IT: Backup has failed” and “Action Required: Rejected Deposit.” Maybe subject line colons should be bann
If you’re looking for a VPN alternative, mesh VPNs could be the answer. Here’s the business case for and against making the switch — and how to get started with mesh VPN Tailscale.
Need to secure non-human entities, leaky clouds, and complex environments? These 7 network security startups have bold ideas.
Attack discovered by Guardio researchers shows how criminals can bypass email protections such as DKIM and SPF.
Escalating cyberthreats, hacktivism, and cyber espionage suggest the Paris Games may present the greatest cybersecurity risk ever. Here’s what to look out for and how to prep.
The Domain Name System Security Extensions provides cryptographic authentication to prevent redirection to rogue websites, but owners of many domains have yet to adopt it.
Sharing connection information could be a problem among users of the same VPN server without proper protection, researchers have found. Corporate VPN servers in particular are vulnerable to the flaw.
The malware leverages Modbus TCP communications to target operational technology assets — and can easily be repurposed to compromise other industrial controllers, putting widespread critical infrastructure at risk.
Because IT has so little visibility into non-human identities, attackers are increasingly seeking them out as ultra-easy onramps to everything of value in your enterprise. The solution? Stop treating NHIs as though they are another human end-user.