Networks

The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.

  • How a Data Protection Impact Assessment Helps You Comply with GDPR

    The European Union’s General Data Protection Regulation, or GDPR for short, takes effect on May 25, just three months from now. It’s the biggest new compliance regulation in many years, and businesses that are unprepared may face some unpleasant consequences. That’s where a data protection impact assessment, often shortened to DPIA, can help. We’ll get…


  • IBM QRadar vs Splunk: Top SIEM Solutions Compared

      IBM QRadar and Splunk are two of the top security information and event management (SIEM) solutions, but each product offers distinct benefits to potential buyers. Both SIEM solutions were featured in eSecurity Planet‘s list of top 10 SIEM products. Both companies offer strong core SIEM products, but differ in intelligence features and integration with…


  • AI’s Future in Cybersecurity

      Artificial intelligence is already redefining cybersecurity, exposing sophisticated attacks and adding a level of Terminator-style relentlessness to threat detection tools and anti-malware software. AI is even being used by a startup to scour the dark web for evidence that its customers have been hacked and their sensitive data is being peddled on illicit marketplaces.…


  • What is Cryptojacking and Why Is It a Cybersecurity Risk?

    Are your systems running slower than they should? Perhaps a certain web page is more sluggish than usual and your system seems to lag. Be concerned – you could potentially be a victim of a cryptojacking campaign. Cryptojacking is a relatively new term and is a class of attack that gained significant momentum in the…


  • How AI Is Redefining Cybersecurity

    By practically every measure, cybersecurity threats are growing more numerous and sophisticated each passing day, a state of affairs that doesn’t bode well for an IT industry struggling with a security skills shortage. In a recent ESG and ISSA survey, 70 percent of cyber security professionals felt the cybersecurity skills gap had an effect on…


  • Almost a Third of All U.S. Businesses Were Breached in 2017

    Twenty-nine percent of U.S. businesses suffered a data breach in the past year, according to a recent HSB survey of 403 senior executives in the U.S., conducted by Zogby Analytics. Two thirds of respondents whose businesses were breached said their company’s reputation was negatively affected by the incident. Twenty-seven percent of respondents spent between $5,000…


  • Over 1.4 Billion Clear Text Login Credentials Found in Single Database on Dark Web

    4iQ researchers recently came across a single 41 GB file containing a searchable database of more than 1.4 billion clear text login credentials on the dark Web. The largest-ever password dump brings together credentials stolen in 252 separate breaches, including the LinkedIn breach. When the researchers came across the file last week, new data had…


  • 3 Lessons to Learn from the Uber Breach

    Uber yesterday admitted that it covered up a massive data breach of 57 million customers’ and 600,000 drivers’ information in late 2016 by paying the hackers a $100,000 ransom. In a statement, Uber CEO Dara Khosrowshahi said two hackers “inappropriately accessed user data stored on a third-party cloud-based service that we use.” Specifically, Bloomberg reports,…


  • How to Achieve an Optimal Security Posture

      The perfect IT security solution is one that makes an enterprise completely secure and “unhackable,” where no unauthorized parties can get onto the network, access confidential data, deny service to legitimate users, or otherwise carry out any malicious or unwanted activities. Anyone who reads the security news these days knows that perfect security is…


  • The Software Supply Chain: Where Security Starts

    Concern about software supply chain security and the potential insertion of malware backdoors is at the forefront of cyber security challenges, but the problem has been around for decades and governments and industry are just getting around to addressing it now. You might question my assertion that this has been a concern for decades, so…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies