Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • Security Operations Center (SOC) Best Practices

    Enterprises face an onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and suspicious behavior. Endpoint security, intrusion detection and prevention, security information and event management (SIEM), threat intelligence, and other security systems flood security teams with alerts and log entries. With the number and sophistication…


  • RSA Conference 2021: Speakers, Vendors & Sessions

    The RSA Conference is one of the biggest events of the year in the InfoSec industry, drawing vendors, experts, security practitioners and the curious from near and far. The theme for the 2019 event is “Better,” with the idea being that organizations, vendors and the cybersecurity industry as a whole can continue to do better.…


  • Over Half of Companies Are Upping Spending on IT Security

    Driven by fear of data breaches and new privacy regulations, such as Europe’s General Data Protection Regulation (GDPR), large enterprises are spending aggressively on IT security measures, according to eSecurity Planet‘s newly released 2019 State of IT Security survey. The survey found that 54 percent of companies will increase their IT security spending this year,…


  • Cyber Security Jobs & Salary for 2021

    With a global cybersecurity staffing shortage of 3 million and growing, including a need for 500,000 IT security pros in North America alone, IT security jobs are going to be in plentiful supply again in 2019, and those with the right skills will be able to take their pick. The shortage of security talent isn’t…


  • UEBA: Protecting Your Network When Other Security Systems Fail

    User and entity behavior analytics (UEBA) is a valuable tool for detecting signs of malicious activity within your network. UEBA monitors the activities of users and entities (such as hardware devices and networks) and compares present activity to “normal” or “baseline” behavior. Using advanced statistical analysis and, in some cases, machine learning algorithms, the aim…


  • UTM Appliance Definition

      A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. See our picks for Top UTM vendors. UTM appliances provide an alternative approach to building a security solution from several different point products, often from different vendors. These point…


  • 10 Security Projects CISOs Should Consider: Gartner Analyst

    At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk. First, though, MacDonald listed 10 things enterprises should already be doing to “make sure you’ve got the basics right.” Those 10 basics are: Upgrade to the…


  • Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

    Cybercriminals may be more aggressive than ever, but security vendors are responding with new technologies – and enterprises are investing in them. Those were some of the recurring themes at this week’s Gartner Security Summit in National Harbor, Maryland, where more than 3,400 IT executives gathered to hear the latest in cybersecurity trends and technologies.…


  • How to Secure Edge Computing

    The notion of edge computing is a relatively nascent one in modern IT. While end user, data center and cloud computing are well understood, Edge computing is still struggling to define itself – and come to terms with some significant security challenges. At the OpenStack Summit in Vancouver on May 23, a panel of experts…


  • How Pseudonymization Can Help You Comply with GDPR

    Pseudonymization is one strategy that could help businesses struggling to comply with the European Union’s General Data Protection Regulation (GDPR). GDPR goes into effect on May 25, bringing with it stringent new data privacy protections for companies with European customers – and steep penalties for failing to comply with those regulations. One recent report found…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies